Metasploit
641ecb65ca
automatic module_metadata_base.json update
2019-10-31 08:33:31 -05:00
Shelby Pace
0b4a0b3148
Land #12476 , add Nostromo dir traversal RCE
2019-10-31 08:24:41 -05:00
Shelby Pace
99fd254348
add reference
2019-10-31 08:23:57 -05:00
Quentin Kaiser
4a6c1d824b
Merge branch 'CVE-2019-16278' of github.com:QKaiser/metasploit-framework into CVE-2019-16278
2019-10-31 10:26:16 +01:00
Quentin Kaiser
ca81793860
Forgot to put ForceExploit in registered options.
2019-10-31 10:25:26 +01:00
Christian Mehlmauer
a36886301b
Land #12513 , migrate to alpine 3.10 and fix ruby reference
2019-10-31 08:20:29 +01:00
ducksecops
2f26ddf156
Updated Dockerfile to Alpine 3.10 with Ruby 2.6.5
2019-10-30 22:16:03 +00:00
Quentin Kaiser
a55c5c6765
Update documentation/modules/exploit/multi/http/nostromo_code_exec.md
...
s/Nostrom/Nostromo/
Co-Authored-By: Shelby Pace <40177151+space-r7@users.noreply.github.com >
2019-10-30 15:38:50 +01:00
Metasploit
b7acbfe8b6
automatic module_metadata_base.json update
2019-10-29 14:36:15 -05:00
Brent Cook
5169744fd8
Land #12505 , enhance grub_creds module from grub_password module
2019-10-29 14:28:43 -05:00
Metasploit
352e7a83ac
Bump version of framework to 5.0.58
2019-10-29 14:09:13 -05:00
Quentin Kaiser
f03f5e4904
Documentation updated based on latest module version.
2019-10-29 16:13:25 +01:00
Quentin Kaiser
0531dd7bb9
Hash rocket alignment.
2019-10-29 12:28:39 +01:00
Quentin Kaiser
bc0c2bf721
check function rewrite.
2019-10-29 12:27:15 +01:00
Quentin Kaiser
436d6781c1
Fix description.
2019-10-29 12:25:01 +01:00
Quentin Kaiser
b357db22cf
Fix description.
2019-10-29 12:24:22 +01:00
Quentin Kaiser
8bbb33c483
Generic name.
2019-10-29 12:24:00 +01:00
Quentin Kaiser
b6dd30302a
Rewriting of command stager, based on exploits/unix/webapp/webmin_backdoor.
2019-10-29 12:23:19 +01:00
Brent Cook
04c3b68820
fix no-creds case, don't print table and creds unless we found some
2019-10-29 04:31:12 -05:00
Brent Cook
99ed2b7bf2
merge modules and documentation
2019-10-29 04:27:25 -05:00
Brent Cook
4abee63936
only loot config files with passwords
2019-10-29 04:18:08 -05:00
Brent Cook
4c1f117566
add auto targeting from grub.d and FILENAME option
2019-10-29 04:17:47 -05:00
Brent Cook
0ebcda3aaa
merge credits
2019-10-29 04:17:26 -05:00
Brent Cook
4d8e9bad26
expand file list from grub_cred
2019-10-29 03:42:23 -05:00
Brent Cook
bd76e1f2cb
initial tidy pass w/rubocop
2019-10-29 03:42:01 -05:00
Metasploit
5543692f2b
automatic module_metadata_base.json update
2019-10-29 03:36:02 -05:00
Brent Cook
c6ecef3dc7
Merge #11426 , other grub password extraction module
2019-10-29 03:34:36 -05:00
Brent Cook
effc8cbe72
Land #12500 , Use check_code.message, not .second
2019-10-29 03:26:38 -05:00
bwatters-r7
23e3bc3e96
Land #12502 , Fix process migration on reverse_tcp meterpreter sessions w/ newer Ruby
...
Merge branch 'land-12502' into upstream-master
2019-10-28 08:11:31 -05:00
Brent Cook
6a9cc9b384
use the common method for enabling secure TLV channel
2019-10-28 06:25:51 -05:00
Brent Cook
4f33267db5
Wait for threads to exit after killing them.
2019-10-28 06:25:15 -05:00
Brendan Coles
e9a7ceaf1c
Use CheckCode.message - Fix #12499
2019-10-28 03:24:20 +00:00
Metasploit
7d6235e062
Bump version of framework to 5.0.57
2019-10-25 13:43:22 -05:00
bwatters-r7
326a2d2459
Land #12491 , Update .mailmap
...
Merge branch 'land-12491' into upstream-master
2019-10-25 12:05:51 -05:00
bwatters-r7
315164b388
Land #12467 , Bug Fix: nops generate '-s' option ignored
...
Merge branch 'land-12467' into upstream-master
2019-10-25 12:02:20 -05:00
Brent Cook
c62f4598f8
Land #12482 , Fix the default meterpreter prompt
2019-10-25 11:11:22 -04:00
Christophe De La Fuente
c37e2eaebb
Update email mapping for @wvu
2019-10-25 13:08:06 +02:00
nil0x42
d7b629c858
Apply suggestions from code review
...
Co-Authored-By: Brendan <bwatters@rapid7.com >
2019-10-25 05:34:56 -03:00
Christophe De La Fuente
6c6ceb9297
Remove unused mapping for @wvu
2019-10-24 19:52:52 +02:00
Christophe De La Fuente
40d2d7356a
Add mapping to .mailmap for cdelafuente-r7
2019-10-24 19:48:41 +02:00
Metasploit
519b75d4d3
Bump version of framework to 5.0.56
2019-10-24 12:06:04 -05:00
h00die
47fcd52f65
Land #12456 aux scanner html title docs
2019-10-23 20:58:34 -04:00
h00die
1c9eb0f788
change < to < to prevent md parsing
2019-10-23 20:57:54 -04:00
Metasploit
31dc9197d7
automatic module_metadata_base.json update
2019-10-23 13:37:15 -05:00
Shelby Pace
fcc9ad628c
Land #12473 , add xscreensaver log privesc
2019-10-23 13:27:45 -05:00
Metasploit
4c3abbae01
automatic module_metadata_base.json update
2019-10-23 12:47:24 -05:00
Wei Chen
50baaf4d9c
Land #12464 , Add ThinVNC Directory Traversal module
2019-10-23 12:39:20 -05:00
Metasploit
b65e55f7e8
automatic module_metadata_base.json update
2019-10-23 09:01:45 -05:00
Brendan Coles
991ccdbda5
Land #12106 , Add Linux PTRACE_TRACEME local root exploit
2019-10-23 14:01:14 +00:00
Tim W
8c93b219d1
fix compile.rb and rubocop
2019-10-23 20:54:42 +08:00
Tim W
7ff71819e9
add architecture check to check method
2019-10-23 20:38:55 +08:00
Tim W
3cb9f2d709
remove pointless upload_binary function
2019-10-23 20:28:13 +08:00
Tim W
3b5d0b98e7
add a basic check method using loginctl
2019-10-23 19:50:19 +08:00
Metasploit
0e8ed964db
automatic module_metadata_base.json update
2019-10-23 01:55:48 -05:00
Tim W
94dd87b004
Land #12483 , futex_requeue improvements
2019-10-23 14:47:56 +08:00
Tim W
7d25e321ef
add some more comments
2019-10-23 14:45:32 +08:00
Brendan Coles
ab9d1470d2
Use workaround for horrific command tokenisation
2019-10-23 06:37:30 +00:00
h00die
2d829f9d46
first upgrade on futex
2019-10-22 21:05:55 -04:00
Spencer McIntyre
e771147046
Fix the default meterpreter prompt
2019-10-22 20:02:32 -04:00
Metasploit
92bf2a5067
automatic module_metadata_base.json update
2019-10-22 14:19:32 -05:00
Shelby Pace
e8469dca93
Land #11025 , add Xorg SUID Modulepath Privesc
2019-10-22 14:11:00 -05:00
Shelby Pace
1ceaa1d7ba
add documentation
2019-10-22 10:43:35 -05:00
Shelby Pace
f4a54df262
change location of rescue, method name
2019-10-22 09:31:43 -05:00
Brendan Coles
39db3be145
Update tested versions
2019-10-22 06:35:57 +00:00
Shelby Pace
1fd09b6a81
add solaris targets and Metasm usage
2019-10-21 16:13:10 -05:00
Metasploit
166a20e7d5
automatic module_metadata_base.json update
2019-10-21 15:43:35 -05:00
William Vu
3565b0efb8
Land #12365 , Total.js CMS widget creation RCE
2019-10-21 15:22:09 -05:00
Quentin Kaiser
295d609595
Add CVE-2019-16278 exploit documentation.
2019-10-21 21:15:04 +02:00
Metasploit
800c656fd7
automatic module_metadata_base.json update
2019-10-21 12:45:47 -05:00
Brent Cook
58b8990131
Land #12462 , add post module to gather grub passwords
2019-10-21 12:35:52 -05:00
Brent Cook
99d55d6110
Land #12423 , added docs for git_scanner and goahead_traversal module
2019-10-21 12:24:54 -05:00
bwatters-r7
ee282fe84c
Land #12458 , Refactor extended check messages
...
Merge branch 'land-12458' into upstream-master
2019-10-21 12:23:06 -05:00
Brent Cook
519c73dcb3
Land #12450 , add docs for the heartbleed module
2019-10-21 12:21:53 -05:00
Brent Cook
100c0a7580
Land #12438 , add support for custom Meterpreter prompts
2019-10-21 12:20:06 -05:00
Metasploit
8ca882ddd8
automatic module_metadata_base.json update
2019-10-21 11:13:35 -05:00
Quentin Kaiser
d76ea0ca59
Initial module version for Nostromo RCE (CVE-2019-16278).
2019-10-21 18:11:44 +02:00
bwatters-r7
eaa752454b
Land #12399 , Add Urgent/11 vulnerability scanner
...
Merge branch 'land-12399' into upstream-master
2019-10-21 11:05:09 -05:00
Brent Cook
cc8ed049c0
add module docs
2019-10-21 11:03:23 -05:00
Brent Cook
be57b284a9
split more neatly, support commas
2019-10-21 10:43:28 -05:00
Mustafa Çalap
647839d8b5
add more examples for http_title ( #1 )
...
add more examples for http_title
2019-10-21 10:14:00 +02:00
Brendan Coles
cdf5ef5e2d
Add documentation
2019-10-21 06:16:09 +00:00
Brendan Coles
84430c2a66
Add Solaris xscreensaver log Privilege Escalation module
2019-10-21 06:14:50 +00:00
Brent Cook
7cb683646f
remove unused RPORT
2019-10-20 21:40:05 -05:00
Brent Cook
def423c261
add RHOSTS support for multi-port
2019-10-20 21:37:55 -05:00
Brent Cook
b1942bb9ec
use probe socket for detection, pad TCP NOP explicitly
2019-10-20 21:31:33 -05:00
Brent Cook
f68e574795
close sockets, do preflight check to avoid F+
2019-10-20 20:26:16 -05:00
h00die
0fbf553a49
add more examples
2019-10-20 21:18:30 -04:00
Brent Cook
d005c2d3ee
malform packets more (once more with feeling), add report mixin for reporting
2019-10-20 20:00:56 -05:00
h00die
f4e15b98ee
Land #12454 docs for redis file upload
2019-10-20 20:35:56 -04:00
h00die
c35554b37c
redis doc touchup
2019-10-20 20:34:11 -04:00
sinn3r
7683ab4fc1
Land #12455 , Add generate_random_c method to randomized compiler
...
Add generate_random_c method to randomized compiler
2019-10-18 15:51:19 -05:00
nil0x42
e48132d7df
Bug Fix: nops generate '-s' option ignored
...
This error was trying to parse the contents of undefined '-c' option instead of '-s'.
Making impossible the definition of SaveRegisters from the console.
Step to reproduce:
`msfconsole -q -x 'use nop/x86/single_byte; generate -s esp 10; exit' | grep -v '0m' | tr -d '\n\\x+ ";' | rasm2 -b 32 -D -`
```asm
0x00000000 1 0e push cs
0x00000001 1 d6 salc
0x00000002 1 54 push esp
0x00000003 1 f8 clc
0x00000004 1 43 inc ebx
0x00000005 1 56 push esi
0x00000006 1 5a pop edx
0x00000007 1 56 push esi
0x00000008 1 5a pop edx
0x00000009 1 44 inc esp
```
As we can see, 'inc esp', and some 'push/pop' instructions have been generated although having explicitly asked to save `esp` register through `generate` command.
This commit addresses this issue
2019-10-18 17:31:03 +00:00
William Vu
b870cadb0f
Reregister INTERFACE datastore option
...
In case configuration failed.
2019-10-18 12:08:45 -05:00
William Vu
3d08f7c746
Update DisclosureDate comment
2019-10-18 12:07:28 -05:00
William Vu
3c74bdd7ee
Add CRASH_SAFE module trait to notes
2019-10-18 12:01:27 -05:00
Shelby Pace
ca755843f1
remove call to generate_random_c
2019-10-18 11:06:40 -05:00
Adam Cammack
121a6fd0e7
Order matters sometimes
...
Since the constants are evaluated when they are declared, they need to
be after the new `#initialize` method since it sets the messages.
2019-10-18 10:57:16 -05:00
Shelby Pace
42b251be01
generate random c within compile_random_c
2019-10-18 08:28:25 -05:00
Metasploit
aa4534bb50
automatic module_metadata_base.json update
2019-10-18 06:36:43 -05:00
dwelch-r7
0563edcd28
Land #11420 , Add exchange web services aux module
2019-10-18 12:28:24 +01:00
dwelch-r7
9ad5e353fe
Use latest framework version
2019-10-18 12:21:33 +01:00
Jeffrey Martin
b2c753d446
Land #12459 , Imports need workspace
2019-10-17 17:01:12 -05:00
Metasploit
ccd4e93a9e
Bump version of framework to 5.0.55
2019-10-17 12:05:32 -05:00
Brendan Coles
de3cde6a15
Add documentation
2019-10-17 07:51:33 +00:00
Brendan Coles
43c980ed29
Add ThinVNC Directory Traversal module
2019-10-17 07:44:19 +00:00
Taeber Rapczak
c92ea2b799
Add documentation for post module
2019-10-16 19:06:14 -04:00
h00die
4c6f0b1562
repeat and nmap
2019-10-16 18:00:57 -04:00
Mustafa Çalap
c15d5d1ec9
Add confirming with section to http title module doc
2019-10-16 19:58:54 +02:00
Brent Cook
856b3358de
Land #12416 , add tftpbrute docs
2019-10-16 12:05:41 +01:00
Taeber Rapczak
1c9a3c74d5
Add post module to collect grub passwords
...
closes #11166
2019-10-16 00:45:33 -04:00
Adam Cammack
ba9c46ee91
Remove CheckCodes kludge from external modules
...
Now that the new CheckCode class can add boilerplate human text by
itself we no longer need the hash of built-in values.
2019-10-15 16:24:35 -05:00
Adam Cammack
7e5f866ffe
Keep extended check reasons separate from messages
...
Have the long code text and the reason glued together does not make
sense for all check displayers. I would prefer to have this at a
different level, but I'm not too keen on refactoring all the places
where it's touched. I couldn't find any remaining places that depend on
the length of the struct, so this looks safe to add straight as another
field.
2019-10-15 16:24:02 -05:00
Jeffrey Martin
289a9c56f3
when making requests to report send workspace
...
The report methods of the db layer require the workspace during import.
2019-10-15 15:32:00 -05:00
Jeffrey Martin
b494bf5d65
cred imports need a workspace object passed to lib
...
Metasploit::Credential importers expect an Mdm::Workspace object.
2019-10-15 14:51:53 -05:00
Mustafa Çalap
80115a5cf2
Add documentation for http title module
2019-10-15 21:34:52 +02:00
Wei Chen
0ebc971d29
Use CmdStager mixin
2019-10-15 14:00:58 -05:00
Shelby Pace
3c50f3d54e
add generate_random_c method
2019-10-15 12:50:58 -05:00
Metasploit
b1ae404e6c
automatic module_metadata_base.json update
2019-10-15 11:23:22 -05:00
bwatters-r7
f5bb6f8ca2
Land #12428 , Extend check codes with custom messages
...
Merge branch 'land-12428' into upstream-master
2019-10-15 11:06:33 -05:00
Wei Chen
bb7c42b2ce
Arch and disclosure date
2019-10-15 10:25:20 -05:00
Wei Chen
a3331dba9f
Move totaljs cms module and doc
2019-10-15 10:11:14 -05:00
pkb1s
8eed4c7545
Update exchange_web_server_pushsubscription.rb
2019-10-15 15:43:55 +01:00
Metasploit
feeef90c82
automatic module_metadata_base.json update
2019-10-15 09:35:24 -05:00
Brent Cook
59bf03b947
Land #12420 , Add environment-based API token authentication
2019-10-15 15:27:05 +01:00
Emmett Kelly
d670e31e34
Remove unnecessary requirement
2019-10-15 15:18:41 +01:00
Mustafa Çalap
7eb1f07062
Add documentation for redis file_upload module
2019-10-15 14:03:19 +02:00
William Vu
4a9a3604f6
Fix tcp_malformed_options_detection scoring
...
Typo defaulted @vxworks_score and @ipnet_score to 100 instead of -100.
This commit also refactors the method to align with the others.
2019-10-14 21:00:52 -05:00
William Vu
3e0b58613a
Flip TCP source/destination logic
2019-10-14 20:17:39 -05:00
Brent Cook
d3208d8196
add tcp malformed options detection
...
Authored by busterb two commits ago and recommitted by wvu now. Oops.
2019-10-14 20:10:17 -05:00
William Vu
aaf9e688b9
Remove Python external module
2019-10-14 19:38:43 -05:00
William Vu
1b0b0e8ce5
Add tcp_dos_detection
2019-10-14 19:37:59 -05:00
Shelby Pace
ec9ea4ce0d
Land #12366 , fix nil check in atutor module
2019-10-14 18:14:06 -05:00
William Vu
b667965b58
Refactor detections and add scoring
2019-10-14 17:26:08 -05:00
William Vu
f5c7e568b9
Clarify that packet configuration sends UDP
2019-10-14 13:31:55 -05:00
William Vu
ca86041951
Configure Ethernet and IP headers automatically
2019-10-14 13:18:27 -05:00
William Vu
3a0a9868aa
Prefer Packet#to_w
2019-10-14 12:41:44 -05:00
William Vu
14ce82967e
Finish echo request and use capture_sendto
2019-10-14 12:10:28 -05:00
William Vu
9f3d65b9fe
Prefer Packet#payload
2019-10-14 11:59:03 -05:00
William Vu
0b7b88e397
Start work on icmp_timestamp_detection
2019-10-14 11:53:29 -05:00
William Vu
6321946a82
Start work on scanner
2019-10-14 11:33:13 -05:00
Brent Cook
63acf686a6
Fixed typos, extended messages append existing ones
2019-10-14 15:52:24 +01:00
Shelby Pace
d4ac2efcc9
add parsing function and cred table
2019-10-14 09:34:55 -05:00
h00die
55df5f69bb
Land #12418 redis_server scanner docs
2019-10-13 21:18:56 -04:00
h00die
182259f740
md format update
2019-10-13 21:17:54 -04:00
Mustafa Çalap
be3e26411b
Add options header for redis_server module doc
2019-10-13 20:09:18 +02:00
h00die
3dcc9182d8
heartbleed docs
2019-10-13 09:47:34 -04:00
Brent Cook
feefc8d934
fix review notes
2019-10-11 16:32:58 -05:00
Brent Cook
fd447736dc
colors are safe on Windows
2019-10-11 16:23:10 -05:00
Brent Cook
b300284d82
switch logic
2019-10-11 16:22:51 -05:00
William Vu
1b696a06a1
Merge remote-tracking branch 'upstream/master' into pr/12399
2019-10-11 13:05:55 -05:00
Brent Cook
602b7f2091
begin ruby port
2019-10-11 11:26:19 -05:00
Metasploit
e7233c1f8e
automatic module_metadata_base.json update
2019-10-11 10:58:36 -05:00
Brent Cook
b4c184c01c
move to better place
2019-10-11 10:57:07 -05:00
William Vu
58f665209a
Land #12444 , CONTRIBUTING.md update on questions
2019-10-11 10:50:36 -05:00
William Vu
92cae35e72
Fix typo
2019-10-11 10:50:25 -05:00
Jeffrey Martin
c139786240
add some requests about how to use PRs efficiently
2019-10-11 10:43:23 -05:00
Jeffrey Martin
fe027e4ee0
correct PR queue link text
2019-10-11 10:30:37 -05:00
OJ
82c77a4ec8
Land #12443 Fix Python reverse_http/s
2019-10-11 14:46:51 +10:00
Spencer McIntyre
8bb9f1798b
Add a few more variables including local variants
2019-10-10 22:20:37 -04:00
Spencer McIntyre
85a39f75d8
Use a larger payload size to include the UUID
2019-10-10 22:08:26 -04:00
Spencer McIntyre
ef81205123
Add the %M meterpreter prompt var
2019-10-10 21:13:12 -04:00
Spencer McIntyre
d87308e9c0
Fix a couple of bugs in the MeterpreterPrompt
2019-10-10 21:13:12 -04:00
Spencer McIntyre
48f1e1d909
Add the %D and %U meterpreter prompt chars
2019-10-10 21:13:12 -04:00
Spencer McIntyre
f63fd37938
Support a dynmaic meterpreter prompt
2019-10-10 21:13:12 -04:00
h00die
bd60d009f8
Land #12367 tool to manage docs better
2019-10-10 20:41:36 -04:00
Metasploit
3fc7c77b78
automatic module_metadata_base.json update
2019-10-10 17:08:49 -05:00
Wei Chen
12c930a445
Land #12136 , Add post module for dumping credentials out of NagiosXI
2019-10-10 16:59:40 -05:00
Wei Chen
ffdfe33e11
Check unexpected scenarios
2019-10-10 16:57:49 -05:00
Hugo Kermabon
2bcf62c727
Merge pull request #3 from h00die/land-12367
...
add links
2019-10-10 21:45:03 +02:00
Metasploit
d4b0f4d5a0
automatic module_metadata_base.json update
2019-10-10 14:17:28 -05:00
h00die
fff6286289
Land #12437 docs for wp_dukapress_file_read
2019-10-10 15:08:56 -04:00
h00die
fccb7b0efc
dukapress correct versions
2019-10-10 15:05:57 -04:00
h00die
095283b861
Land #12436 docs for wordpress_scanner
2019-10-10 15:02:53 -04:00
h00die
d321f5ee47
Land #12435 wordpress_xmlrpc_login docs
2019-10-10 14:58:27 -04:00
Metasploit
6c44605799
Bump version of framework to 5.0.54
2019-10-10 12:05:04 -05:00
weh
fa292d3184
Change vhost option
2019-10-10 18:36:26 +02:00
weh
98a7649528
Fix plugin version number
2019-10-10 18:34:53 +02:00
Patrik Wehrli
73be8cf7c2
Update vhost option in verification steps
2019-10-10 17:05:11 +02:00
Patrik Wehrli
67a363cce9
Replace domain with hostname
2019-10-10 17:01:08 +02:00
Patrik Wehrli
a450c64f12
Change vhost option to domain
2019-10-10 16:57:20 +02:00
weh
6cb27a22db
Remove trailing spaces
2019-10-10 12:45:45 +02:00
weh
bed0369af7
Apply Pullrequest Feedback
2019-10-10 12:44:19 +02:00
weh
00a7bb90a1
Apply Pullrequest Feedback
2019-10-10 12:41:20 +02:00
weh
1ba3b1326f
Apply Pullrequest Feedback
2019-10-10 08:55:05 +02:00
Tim W
8f01ea3c49
update docs description
2019-10-10 13:38:37 +08:00
Tim W
4d4754a389
feedback from bcoles
2019-10-10 13:30:31 +08:00
Tim
620609c955
Update lib/msf/core/post/linux/compile.rb
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-10-10 13:13:40 +08:00
Jeffrey Martin
a931cd58a2
Land #12401 , Get rid of RSpec implicit block expectation syntax
2019-10-09 16:40:51 -05:00
weh
d73503d506
Add docuentation for wp_dukapress_file_read scanner
2019-10-09 21:05:39 +02:00
weh
138b5284d2
Add docuentation for auxiliary/scanner/http/wordpress_scanner
2019-10-09 19:54:57 +02:00
weh
deaa7be8ce
Add documentation for wordpress_xmlrpc_login aux scanner
2019-10-09 18:54:16 +02:00
William Vu
a6ec5131ad
Land #12432 , length check for rdp_recv result
2019-10-09 11:39:48 -05:00
Brent Cook
2d43b88b48
Land #12434 , fix doc dash
2019-10-09 11:36:41 -05:00
William Vu
6fac30aec8
Change vprint_status to vprint_error
2019-10-09 11:36:39 -05:00
William Vu
ad98c2e81c
Fix misnamed BlueKeep exploit documentation
...
Should be an underscore, not a hyphen.
2019-10-09 11:27:50 -05:00
Brent Cook
62412c8d00
log a bit more about what happened
2019-10-09 08:39:03 -05:00
Brent Cook
c4365cfe08
handle extra data on rdp_recv with length check
...
We should really be doing something like strictly parsing PDU headers in rdp_recv and then parseling out PDUs instead of recv_and_pray, but this should get us past the initial issue where sometimes there is an extra PDU right after
2019-10-09 08:22:02 -05:00
dwelch-r7
0e2923e9df
Land #12431 , link COPYING in readme
2019-10-09 13:26:45 +01:00
William Vu
1a831573bc
Land #12430 , there's a goose in my MSF
2019-10-08 16:38:47 -05:00
Adam Cammack
f9c5939a29
Teach more things about the new check codes
2019-10-08 16:21:40 -05:00
0xGilda
0b95acf0b3
Update honk.txt to MSF substitution sequences
...
as per: https://github.com/rapid7/metasploit-framework/pull/12430#issuecomment-539669624
2019-10-08 20:53:59 +01:00
0xGilda
ad70e10452
Add new Untitled Goose Game inspired logo
...
Inspired by an @IanColdwater tweet.
2019-10-08 19:52:11 +01:00
Metasploit
16e9c7cf5f
automatic module_metadata_base.json update
2019-10-08 13:27:51 -05:00
Brent Cook
cb001910ab
Land #12426 , remove duplicate payload_inject module
2019-10-08 13:19:34 -05:00
Brent Cook
aadfb843bb
add module move metadata
2019-10-08 13:18:47 -05:00
Brent Cook
7e2ea42b54
Land #12404 , fix potential nil object and mass deletion in shell session handler
2019-10-08 13:02:41 -05:00
Metasploit
05c00b458e
automatic module_metadata_base.json update
2019-10-08 10:50:02 -05:00
Brent Cook
baa0a12f71
Land #12421 , use more specific requires for jtr parsing
2019-10-08 10:41:53 -05:00
Adam Cammack
b65882a314
Use new CheckCodes to tidy up the bluekeep scanner
2019-10-08 09:57:53 -05:00
Adam Cammack
2a32c7b9c5
Extend check codes to allow custom messages
2019-10-08 09:57:53 -05:00
bwatters-r7
47dd96df68
Remove duplicate module in the wrong place
2019-10-08 08:48:11 -05:00
Emmett Kelly
e0c86b2423
Remove references to file based token provision
2019-10-08 14:29:25 +01:00
Emmett Kelly
fe3ec50239
Set API token in env instead of file
2019-10-08 13:46:07 +01:00
Brent Cook
5ce3f5d166
Land #12400 , Add File Sharing Wizard SEH exploit module
2019-10-08 07:42:47 -05:00
dwelch-r7
951fd7b93e
Replace double quotes with single quotes
2019-10-08 11:44:41 +01:00
Emmett Kelly
fcfc78acc5
Use consistent API auth failure error handling
2019-10-08 11:14:23 +01:00
Emmett Kelly
8697b424b2
Use consistent environment variable name
2019-10-08 11:09:04 +01:00
Emmett Kelly
6d74fa2586
Load token config from yml instead of json
2019-10-08 11:03:24 +01:00
h00die
d58cfccc13
goahead traversal logs
2019-10-07 21:41:57 -04:00
h00die
ae8b01904a
docs for git_scanner
2019-10-07 20:38:24 -04:00
Jeffrey Martin
7389417fc5
adjust for more limited require
2019-10-07 11:26:26 -05:00
dwelch-r7
25937c9e35
Use uri param and clean up logging
2019-10-07 17:15:04 +01:00
dwelch-r7
4eb068c9b0
Update target
2019-10-07 15:25:27 +01:00
Emmett Kelly
1f4649a97c
Remove redundant begin block
2019-10-07 15:23:27 +01:00
Emmett Kelly
6e3acd6e9b
Refactor nested else if to elsif
2019-10-07 15:23:01 +01:00
Emmett Kelly
e1d44e2ae3
Remove redundant braces around hash param
2019-10-07 15:22:27 +01:00
dwelch-r7
02376c88fe
Use httpclient over tcpclient
2019-10-07 15:20:30 +01:00
Emmett Kelly
8f33804fe0
Add file based API token authentication
...
Provides a mechanism to specify an API token from a json file.
If the DB is not enabled then the JSON RPC server will check for the
presence of an environment variable (MSF_API_TOKEN_FILE) which should
point to the path of a JSON file. The JSON file should contain a single
key "token". The value of this token is used as the API token which is
required for all JSON RPC API calls.
2019-10-07 14:57:40 +01:00
Mustafa Çalap
f854fa6614
Add documentation for redis_server module
2019-10-07 10:06:02 +02:00
Seniru Pasan Indira
da23b0857e
Added the link for 'COPYING' file
2019-10-07 13:16:15 +05:30
h00die
64d44d0608
tftpbrute docs
2019-10-06 21:24:17 -04:00
h00die
5084e59ee5
add links
2019-10-06 18:13:52 -04:00
dwelch-r7
b723d026ab
Address code review comments
...
Use strings in info hash, port is an integer, remove version number from
name
2019-10-06 15:27:29 +01:00
Metasploit
0c5819de7a
automatic module_metadata_base.json update
2019-10-05 16:11:04 -05:00
Brendan Coles
af05a33957
Land #12408 , Fix spelling mistakes
2019-10-05 21:10:56 +00:00
Metasploit
eeec7a0697
automatic module_metadata_base.json update
2019-10-05 14:49:34 -05:00
Brendan Coles
90ea642c35
Land #12406 , Fix spelling mistakes
2019-10-05 19:42:58 +00:00
Brendan Coles
836f8070ce
Land #12407 , Fix spelling mistakes
2019-10-05 19:41:47 +00:00
h00die
aef0b0b10c
Land #12398 ssh_version docs
2019-10-05 14:48:23 -04:00
h00die
41f273870f
md formatting
2019-10-05 14:47:53 -04:00
h00die
9f29f5f419
fix spelling received
2019-10-05 14:40:27 -04:00
h00die
905eb17132
begining to fix spelling errors
2019-10-05 14:26:34 -04:00
Metasploit
0365f09ee4
automatic module_metadata_base.json update
2019-10-05 13:22:22 -05:00
h00die
4cc85ecb75
adress a spelling problem
2019-10-05 14:22:18 -04:00
h00die
270f1cc63a
Land #12394 fix spelling of separated
2019-10-05 14:14:10 -04:00
h00die
f95f952b65
fix separated spelling
2019-10-05 14:13:38 -04:00
Metasploit
8817981bbc
automatic module_metadata_base.json update
2019-10-05 13:02:08 -05:00
h00die
729f07f2f4
Land #12395 releative spelling fixes
2019-10-05 13:52:51 -04:00
h00die
b7123e2c27
additional releative to relative
2019-10-05 13:50:30 -04:00
Brendan Coles
032a99d84a
to_s - Fix #12345
2019-10-05 10:11:31 +00:00
Metasploit
62107d2a04
automatic module_metadata_base.json update
2019-10-04 21:07:03 -05:00
h00die
d0ff7393e6
Land #12393 fix spelling of initialize
2019-10-04 21:57:20 -04:00
h00die
7718992ea4
fix spelling of initialize
2019-10-04 21:56:52 -04:00
h00die
0eec343770
Land #12392 iis_shortname spelling fix
2019-10-04 21:51:06 -04:00
Hugo Kermabon
a5fd225823
Merge pull request #2 from h00die/land-12367
...
add headings, run date, tab to space
2019-10-04 17:17:41 -04:00
Phil Pirozhkov
87d0fa46f8
Get rid of RSpec implicit block expectation syntax
...
The syntax was removed in rspec-expectations 3.8.5.
Related:
https://blog.rubystyle.guide/rspec/2019/07/17/rspec-implicit-block-syntax.html
https://github.com/rspec/rspec-expectations/pull/1125
https://github.com/rubocop-hq/rspec-style-guide/issues/76
This is a follow-up to #12397 and unpins `rspec-expectations`.
2019-10-04 23:12:34 +03:00
Metasploit
a78b8adb62
automatic module_metadata_base.json update
2019-10-04 14:55:36 -05:00
Brent Cook
3c397b721d
Land #12375 , Add image execute options persistence module
2019-10-04 14:40:37 -05:00
Metasploit
d2407ddd2c
automatic module_metadata_base.json update
2019-10-04 13:07:22 -05:00
bwatters-r7
42859fc275
Land #12388 , Add Required Signature Detection To smb_version
...
Merge branch 'land-12388' into upstream-master
2019-10-04 12:58:49 -05:00
bwatters-r7
1c4bf1a5eb
Land #12396 , Update metasploit Payloads to 1.3.78 to bring in Java keyevent API
...
Merge branch 'land-12396' into upstream-master
2019-10-04 09:52:48 -05:00
dwelch-r7
06661df510
Make rubocop happy
2019-10-04 15:12:51 +01:00
Brent Cook
90840e3787
actual CVEs this detects is more limited, remove extra refs
2019-10-04 08:52:30 -05:00
Brent Cook
1f8b4478cc
convert tool to external Metasploit module
2019-10-04 08:36:04 -05:00
Brent Cook
c68f8733d8
import upstream tool from https://github.com/ArmisSecurity/urgent11-detector
2019-10-04 07:33:57 -05:00
Mustafa Çalap
0f5106c705
Add documentation for ssh_version module
2019-10-04 13:09:08 +02:00
Adam Cammack
f51ffbf092
Land #12368 , Add documentation for SMB capture
2019-10-03 23:36:52 -05:00
Adam Cammack
8fe27d68eb
Fix typo
2019-10-03 23:35:24 -05:00
Adam Cammack
5005e5f9e1
Land #12397 , Pin rspec-expectations
2019-10-03 23:18:26 -05:00
Jeffrey Martin
893a32b195
lock rspec-expectations
...
this applies until a solution to rspec/rspec-expectations#1134 is created
2019-10-03 17:46:22 -05:00
dwelch-r7
938c3a0e76
Add module docs
2019-10-03 23:22:21 +01:00
bwatters-r7
ca39858a7a
Update metasploit Payloads to 1.3.78 to bring in Java keyevent API
2019-10-03 17:11:55 -05:00
Metasploit
863e15865f
Bump version of framework to 5.0.53
2019-10-03 13:41:02 -05:00
Metasploit
9ed739e5f3
Bump version of framework to 5.0.52
2019-10-03 12:12:45 -05:00
Metasploit
54afaedf23
automatic module_metadata_base.json update
2019-10-03 12:07:47 -05:00
Brent Cook
a13d13b578
Land #12385 , remove invalid email addresses
2019-10-03 11:59:15 -05:00
Brent Cook
7619c41254
Land #12387 , bump ruby versions
2019-10-03 11:57:37 -05:00
Dan
a78ccb9522
Corrected spelling in bison_ftp_traversal.rb
...
Fixed spelling error: "releative" to "relative"
2019-10-03 12:47:49 -04:00
Dan
bb252d6ed2
Corrected spelling in db2_auth.rb
...
Fixed spelling error: "seperated" to "separated"
2019-10-03 12:45:09 -04:00
Dan
3393e2446b
Spelling correction in udp_sweep.rb
...
Fixed spelling error: "Intialize" to "Initialize"
2019-10-03 12:38:36 -04:00
Dan
bfea024c3a
Updates iis_shortname_scanner.rb
...
Fixed spelling error: "diclose" to "disclose"
2019-10-03 12:28:54 -04:00
Brent Cook
c2fe0966fa
bump Dockerfile to Ruby 2.6.5
2019-10-03 10:39:36 -05:00
Brent Cook
5a68818c85
bump 2.5.7 as well
2019-10-03 10:39:08 -05:00
dwelch-r7
e13463eb7c
remove default exit func
2019-10-03 16:24:29 +01:00
dwelch-r7
c8c4d8ad77
Add new bad char
2019-10-03 15:46:26 +01:00
h00die
c9cde76842
additional cleanup
2019-10-02 21:03:00 -04:00
h00die
ffc8c7e32a
more ruby style
2019-10-02 20:23:12 -04:00
Spencer McIntyre
db53adf2a1
Fix the require_signing attribute
2019-10-02 20:22:51 -04:00
Jeffrey Martin
783b54b3d6
bump ruby version for latest goodies
2019-10-02 18:55:34 -05:00
Spencer McIntyre
cbf1722b01
Note whether or not SMB requires signatures
2019-10-02 19:22:07 -04:00
bwatters-r7
8142f22f6e
shutup, rubocop
2019-10-02 14:50:00 -05:00
dwelch-r7
20d21b45de
Move module location
2019-10-02 16:08:54 +01:00
dwelch-r7
2f8e22b603
Remove hardcoded shell code and use options from info hash
2019-10-02 15:11:33 +01:00
floyd
c747221863
Remove invalid email addresses
2019-10-02 13:35:25 +02:00
Metasploit
85ea40064c
automatic module_metadata_base.json update
2019-10-02 00:48:17 -05:00
bwatters-r7
477a70934f
Fix copy/pasta error in options
2019-10-01 10:10:51 -05:00
Brent Cook
f3c8037728
Land #12374 , Add DOUBLEPULSAR payload execution and neutralization module
2019-10-01 01:32:35 -05:00
Brent Cook
b223e5e66a
Land #12377 , Fix stack_adjustment bug
2019-10-01 01:31:53 -05:00
William Vu
9592e85975
Fix stack_adjustment nil bug and refactor method
...
Also fix incorrect docs.
2019-09-30 19:18:58 -05:00
Metasploit
00fba6bf48
automatic module_metadata_base.json update
2019-09-30 17:37:28 -05:00
dwelch-r7
db7e594ef4
land #12065 , local file config loader
...
Adds a couple of modules for loading in cisco/juniper configs from a
file without needing a shell and a post module
2019-09-30 23:26:27 +01:00
dwelch-r7
e3c51ed89e
land #12376 , replace intro with introduction
2019-09-30 23:18:28 +01:00
William Vu
ade9c23772
Don't be lazy and spell out "introduction" in docs
...
This was unfortunately my doing, and then people copied me.
2019-09-30 16:58:00 -05:00
William Vu
a1d1303ab9
Add module doc
2019-09-30 16:49:14 -05:00
bwatters-r7
273e8b6a82
Add image execute options persistence module
2019-09-30 16:34:43 -05:00
William Vu
3edb0e3ef5
Reword module title and description
2019-09-30 14:28:53 -05:00
William Vu
4b5c6002b4
Move implant neutralization code to method
2019-09-30 14:18:41 -05:00
William Vu
d5a26b892a
Remove unused status codes in check
2019-09-30 14:18:41 -05:00
William Vu
32728742ea
Clarify why we can't proceed
2019-09-30 14:18:41 -05:00
William Vu
4975a24900
Refactor methods to use @tree_id ivar
...
Whoops, forgot this when I ivar'd it.
2019-09-30 14:18:41 -05:00
William Vu
b1f2fa4e64
Don't hardcode body size
2019-09-30 14:18:41 -05:00
William Vu
ed0b856aac
Prefer << over +=
...
Oops, spending too much time with Python.
2019-09-30 14:18:41 -05:00
William Vu
255af7f2d3
Simplify data count calculation
2019-09-30 14:18:41 -05:00
William Vu
ade715f88a
Update disclosure date to dump date
2019-09-30 14:18:41 -05:00
William Vu
7417aa8a30
Rename module and note kill target in description
2019-09-30 14:18:41 -05:00
William Vu
0392521887
Fix same multiplex ID meaning implant not detected
2019-09-30 14:18:41 -05:00
William Vu
33d7a2a818
Remove SMB::Client::Authenticated
...
They're fine as advanced options, since this targets a null session.
2019-09-30 14:18:41 -05:00
William Vu
6b4cf4970e
Don't support x86 at the moment
2019-09-30 14:18:41 -05:00
William Vu
aa2f7d378a
Create method for kernel shellcode size
2019-09-30 14:18:41 -05:00
William Vu
8190e7067a
Calculate kernel shellcode size
2019-09-30 14:18:41 -05:00
William Vu
05b83ff5da
Calculate max payload size automagically
2019-09-30 14:18:41 -05:00
William Vu
8cae04f194
Use constant for maximum shellcode size
2019-09-30 14:18:41 -05:00
William Vu
fb1bb0fd2f
Don't use NOPs because Peter would be sad
2019-09-30 14:18:41 -05:00
William Vu
530bf9bc0c
Finish RCE with Jacob's help
2019-09-30 14:18:41 -05:00
William Vu
3a5a05f3a9
Use recently enhanced Rex::Text.xor
2019-09-30 14:18:41 -05:00
William Vu
90cb0e039f
Add DOUBLEPULSAR payload execution
2019-09-30 14:18:41 -05:00
h00die
0288649fc2
rename juniper variables
2019-09-30 15:03:38 -04:00
dwelch-r7
30691d1c18
Add ranking
2019-09-30 12:20:38 +01:00
h00die
cbc7d1e6aa
add headings, run date, tab to space
2019-09-28 12:03:51 -04:00
h00die
c188d179ed
fix atutor bugs
2019-09-26 20:37:10 -04:00
h00die
0d143a1ce3
smb capture docs spelling
2019-09-26 19:06:02 -04:00
h00die
82f0daeb68
smb capture docs finished
2019-09-26 19:02:57 -04:00
Metasploit
0a41599ce4
Bump version of framework to 5.0.51
2019-09-26 12:12:14 -05:00
Metasploit
dd13820cac
automatic module_metadata_base.json update
2019-09-26 10:16:31 -05:00
dwelch-r7
84cc85a099
Land #12316 prefix fingerprint by rhost and rport
2019-09-26 16:04:53 +01:00
dwelch-r7
f6eaeaac71
Merge remote-tracking branch 'upstream/pr/12316' into HEAD
2019-09-26 15:20:45 +01:00
dwelch-r7
7395297da4
Add rank
2019-09-26 13:32:36 +01:00
dwelch-r7
1425d180b9
Add module to exploit file sharing wizard
2019-09-26 13:30:52 +01:00
Metasploit
a63fd26eb5
automatic module_metadata_base.json update
2019-09-26 03:59:11 -05:00
Brent Cook
279930a88a
Land #12318 , Add mazda_ic_mover module documentation
2019-09-26 03:50:47 -05:00
Brent Cook
2227903585
Land #12313 , Add mazda_ic_mover module that moves the instrument cluster
2019-09-26 03:50:29 -05:00
Metasploit
8f049f5c23
automatic module_metadata_base.json update
2019-09-26 03:45:09 -05:00
Brent Cook
c86511722a
Land #12258 , Update gpp.rb to display GPO name
2019-09-26 03:36:28 -05:00
Wei Chen
6a80bf2cf5
Should ensure, not in exception
2019-09-25 22:23:41 -05:00
h00die
24021d1b12
smb capture docs round 2
2019-09-25 22:53:45 -04:00
h00die
74c765c6ac
smb capture docs round 1
2019-09-25 22:50:18 -04:00
h00die
d6a7da9490
fix atutor nil
2019-09-25 22:02:55 -04:00
h00die
ca99bd4191
fix nil check
2019-09-25 21:24:14 -04:00
Wei Chen
8dc238e687
Add TotaJS CMS Code Injection in Widget Creation
2019-09-25 16:54:44 -05:00
h00die
4d05287412
land #12361 spell multiple correctly
2019-09-25 15:41:57 -04:00
William Vu
21df0ff4bb
Fix "mutliple" typo in CONTRIBUTING.md
2019-09-25 11:14:08 -05:00
Metasploit
496504657c
automatic module_metadata_base.json update
2019-09-25 07:48:50 -05:00
Brent Cook
026f9cbd96
Land #12354 , Remove unused targets from aux and post modules
2019-09-25 07:40:06 -05:00
Brent Cook
c53346d500
Land #12353 , Make BlueKeep scanner less chatty by default
2019-09-25 07:37:55 -05:00
h00die
a9aa5c4577
land #12358 rspec overlapping variables fix
2019-09-25 05:28:30 -04:00
Brent Cook
fd66829cbb
remove unneeded change in workspace variable
2019-09-25 03:47:14 -05:00
Brent Cook
27f5720055
use unique Dummy*Class per test
2019-09-25 03:46:11 -05:00
Metasploit
a65347dcf7
automatic module_metadata_base.json update
2019-09-24 09:59:10 -05:00
Shelby Pace
4710322cd7
Land #11762 , add sosreport privesc
2019-09-24 09:48:57 -05:00
William Vu
2ce3e4f1c4
Make BlueKeep scanner's output less chatty
2019-09-24 08:49:27 -05:00
dwelch-r7
285244e877
Remove commented out code
2019-09-24 13:51:54 +01:00
Metasploit
4d2c5dbd88
automatic module_metadata_base.json update
2019-09-24 06:27:05 -05:00
dwelch-r7
a587668b9e
Remove Default targets from aux modules
2019-09-24 12:15:43 +01:00
Brent Cook
75c58d39a9
Land #12314 , Clarify file: handling with the RHOSTS parameter
2019-09-24 06:10:29 -05:00
Brent Cook
0ed09cc9bf
Land #11927 , Add Brocade post module and config parser
2019-09-24 05:59:21 -05:00
Brent Cook
2d1e7ffa2f
Land #12349 , Add Proxy/header opts to windows/python stageless
2019-09-24 05:54:51 -05:00
Metasploit
4100972530
automatic module_metadata_base.json update
2019-09-23 11:32:55 -05:00
dwelch-r7
fe2b3f8f29
Remove targets from post modules
2019-09-23 17:26:36 +01:00
Brent Cook
b668e1fa5b
Land #12283 , Add exploit module for CVE-2019-0708 / BlueKeep
2019-09-23 11:22:36 -05:00
Brent Cook
c0be631bf0
tweak groombase for vmware 15.1
2019-09-23 11:01:04 -05:00
dwelch-r7
134765dc40
Remove targets from aux modules
2019-09-23 15:29:38 +01:00
dwelch-r7
4125224af8
Merge pull request #1 from rapid7/master
...
Pull in latest from master
2019-09-23 12:06:45 +01:00
Brent Cook
5b36b6ed71
add docs, simplify some areas
2019-09-23 04:50:54 -05:00
OJ
3c0cb29a7c
Add Proxy/header opts to windows/python stageless
2019-09-23 08:45:43 +10:00
Brent Cook
0715b7688a
use client_random, add notes
2019-09-22 17:20:58 -05:00
Brent Cook
0d34de7d2f
support sending license requests
2019-09-22 16:47:08 -05:00
Metasploit
5b8c97c4f7
automatic module_metadata_base.json update
2019-09-20 16:26:44 -05:00
h00die
5e52f47c17
land #12279 resolve_hosts now databases results
2019-09-20 17:18:07 -04:00
Brent Cook
963489e196
add further license PDU parsing
2019-09-20 08:15:07 -05:00
Clément Notin
3044fdf517
RHOSTS: expand description
2019-09-20 09:56:11 +02:00
Metasploit
4431476ec4
automatic module_metadata_base.json update
2019-09-19 15:04:09 -05:00
Brent Cook
47a3204e34
Land #12295 , Update to modbusclient to use modbus read functions 2 and 4
2019-09-19 14:47:52 -05:00
Metasploit
6d1ee46bba
Bump version of framework to 5.0.50
2019-09-19 12:04:38 -05:00
Brent Cook
acb351ac44
add a few more vmware targets (emphasising the fragility here)
2019-09-19 07:02:02 -05:00
Brent Cook
3174af03e4
add initial license packet handler
2019-09-19 06:09:41 -05:00
Brent Cook
67ee46ec03
add additional target, set default target GROOMSIZE to 100M (thanks aconite33)
2019-09-19 06:05:08 -05:00
Brent Cook
8138e2f185
remove email
2019-09-19 06:05:08 -05:00
Brent Cook
458dc59594
move kernel shellcode comments to the correct place
2019-09-19 06:05:08 -05:00
Brent Cook
d2da56bd90
use specified RDP_CLIENT_NAME
2019-09-19 06:05:08 -05:00
Brent Cook
d80ad89160
resolve msftidy error
2019-09-19 06:05:08 -05:00
Brent Cook
c405fba6b1
name module docs properly
2019-09-19 06:05:08 -05:00
Spencer McIntyre
0a05ee6577
Use the rdp connect/disconnect methods for WinXP
2019-09-19 06:05:08 -05:00
Brent Cook
7e4a99689a
remove separate PoC and shellcode files, replaced with new integrated module
2019-09-19 06:05:08 -05:00
Brent Cook
51c0c24c20
add and update documentation from original PoC
2019-09-19 06:05:08 -05:00
Brent Cook
5b91fa8c88
add initial module documentation stub
2019-09-19 06:05:08 -05:00
Brent Cook
fb729b5f11
add bare metal target
2019-09-19 06:05:08 -05:00
Brent Cook
02ba21a0a0
remove WinVer
2019-09-19 06:05:08 -05:00
Brent Cook
4677e0f389
include internal OS version in target names
2019-09-19 06:05:08 -05:00
Brent Cook
fec749d3b2
perform fingerprinting in scanner
2019-09-19 06:05:08 -05:00
William Vu
de34bc484e
Ensure rdp_disconnect in rdp_scanner
2019-09-19 06:05:08 -05:00
William Vu
cdd3378acc
Clean up BlueKeep exploit
2019-09-19 06:05:08 -05:00
Brent Cook
e32409b379
merge Win 7/2008 targets
2019-09-19 06:05:08 -05:00
Brent Cook
ab631044af
adjust rdp fingerprint code to match self.rdp_sock changes in exploit mixin
2019-09-19 06:05:08 -05:00
Brent Cook
f2c475454a
tag targets for Virtualbox, add Windows 2008R2
2019-09-19 06:05:08 -05:00
Brent Cook
15ce66cb02
adjust to ManualRanking
2019-09-19 06:05:08 -05:00
Brent Cook
35e3704526
add current caveats and notes from zerosum0x0
2019-09-19 06:05:08 -05:00
Brent Cook
e243e1a50d
add a more likely arch with the default fingerprint target
2019-09-19 06:05:08 -05:00
Brent Cook
f3a9af2ea8
rename for consistency with scanner module
2019-09-19 06:05:08 -05:00
Brent Cook
855281b0ac
add auto-target by default, only scan and show a user message for now
2019-09-19 06:05:08 -05:00
Brent Cook
b860cafddf
remove 'COMPACT' mode since it's not needed here
2019-09-19 06:05:08 -05:00
Brent Cook
49cb6204e5
explicit short jump no longer needed with relative address fixes
2019-09-19 06:05:08 -05:00
Brent Cook
559901865e
add PR ref
2019-09-19 06:05:08 -05:00
Brent Cook
9e321dc30e
move hack into fixup code
2019-09-19 06:05:08 -05:00
Brent Cook
9150ab4e1a
add pre/post processor phase to address metasm limits
...
This adds a pre/post processor phase that allows specifying relative
label offsets when loading effective addresses from metasm-generated
code.
2019-09-19 06:05:08 -05:00
Brent Cook
6522866071
specify short jump opcodes explicitly
2019-09-19 06:05:08 -05:00
OJ
f479ed2d73
Small refactors, comments and tidying up
2019-09-19 06:05:08 -05:00
William Vu
725bff5e2d
Add CheckScanner and ForceExploit
2019-09-19 06:05:08 -05:00
Brent Cook
49762084f2
minor cleanup of debug code and remove some fixed encodings (still need a couple)
2019-09-19 06:05:08 -05:00
Brent Cook
a529866e1a
first working metasm shellcode
2019-09-19 06:05:08 -05:00
Brent Cook
6225c5c31f
skip payload encoding, be a bit more self-documenting
2019-09-19 06:05:08 -05:00
Brent Cook
4edf91d0b2
add debug writes (to be removed later)
2019-09-19 06:05:08 -05:00
Brent Cook
121e337e13
fix incorrect bytes in kernel shellcode
2019-09-19 06:05:08 -05:00
OJ
c76e773b8f
Another attempt to get bluekeep working
...
For some reason the existing kernel payload doesn't work with the
exploit as it currently stands, which is very odd given that everything
else seems to be in order.
Hoping to get some help from the rest of the MSF folks as right now
I don't think I can trust the tools that I'm using.
2019-09-19 06:05:08 -05:00
OJ
8412ff319a
Fix disconnect PDU message and start work on payloads
2019-09-19 06:05:08 -05:00
OJ
edcc423eea
Lots more RDP mixin changes, and first pass of ruby exploit
...
This code is at the point where we SHOULD see a crash (given that the
payloads in use for kernel/user are both just As and Bs (deliberate at
this point).
Unforunately the exploit does not result in a crash. Things just keep
on going! I've looked at the difference in the traffic across the two
different exploits (py and rb) and what's clear is that the mixin is
doing a lot more work at the start.
Also, the mixin generates packets of smaller size in the way that it
encodes data (ie. it doesn't always use 2 bytes for a short value, it'll
use 1 instead if only 1 is required).
Pretty sure that the size issues aren't the problem, I think there's
something else in play. I'm at the point where diving into the RDP stuff
even more isn't inspiring so I'm hoping that opening this up to collab
will help us move forward.
2019-09-19 06:05:08 -05:00
OJ
1d6e319ac2
Refactor of RDP mixin to make it more configurable
...
Slowly moving away from a huge hard-coded blob of inflexible bytes
towards a more data-driven approach that allows configuration of various
elements of the packets that are generated.
2019-09-19 06:05:08 -05:00
OJ
eb9088a588
Refactor RDP mixin to hide socket details
...
When dealing with the RDP mixin it makes more sense to not expose
TCP-level things, instead it's better to talk RDP. This changeset makes
it so that consumers of the RDP mixin talk RDP only. They can access the
socket through the `rdp_socket` member if required, but the changes made
here mean they don't have to. Ultimately, this new member should be
`private` instead of `protected`, but I'm leaving it like this for now
in case it is required down the track.
I've also made the assumption that all RDP connects want TCP_NODELAY
set. This might be wrong, but I don't think it is.
From here, users can call `rdp_connect` and `rdp_disconnect` to manage
connectivity to the RDP endpoint. The `rdp_connect` function does not
register the TCP client socket as the global `sock` member on the TCP
module instance, this is to prevent the mixin from clashing with other
users of the TCP client in a given module.
2019-09-19 06:04:58 -05:00
Brent Cook
b9cb6d8820
Allow specifying TLS version via 'SSLVersion' opt
2019-09-19 06:03:17 -05:00
William Vu
9e235edd88
chmod +x so it loads as an external module
2019-09-19 06:02:22 -05:00
Tod Beardsley
5ae1c8ef49
Payload shellcode for Bluekeep from zerosum
...
Not sure where these should go, adjust to taste.
2019-09-19 06:02:22 -05:00
Tod Beardsley
6b4e067c0e
Add rdp_bluekeep.py and needs work
...
From zerosum0x0:
Exploitation and Caveats:
1. You register with channel MS_T120 (and others such as RDPDR/RDPSND) nominally.
2. Full RDP handshake, I like to wait for RDPDR handshake too (code in the .py)
3. You free MS_T120 with the DisconnectProviderIndication message to MS_T120.
4. RDP has chunked messages, so we use this to groom.
a. Chunked messaging ONLY works properly when sent to RDPSND/MS_T120.
b. However, on 7+, MS_T120 will not work and you have to use RDPSND.
i. RDPSND only works when HKLM\SYSTEM\CurrentControlSet\Control\TerminalServer\Winstations\RDP-Tcp\fDisableCam = 0
ii. This registry key is not a default setting for server 2008 R2. SHITTY ISSUE
5. Use chunked grooming to fit new data in the freed channel, account for the allocation header size (like 0x38 I think?). At offset 0x100? is where the "call [rax]" gadget will get its pointer from.
a. The NonPagedPool (NPP) starts at a fixed address on XP-7
i. Hot-swap memory is another SHITTY ISSUE. With certain VMWare and Hyper-V setups, the OS allocates a buncha PTE stuff before the NPP start. This can be anywhere from 100 mb to gigabytes of offset before the NPP start.
b. Set offset 0x100 to NPPStart+SizeOfGroomInMB
c. Groom chunk the shellcode, at *(NPPStart+SizeOfGroomInMB) you need [NPPStart+SizeOfGroomInMB+8...payload]... because "call [rax]" is an indirect call
d. We are limited to 0x400 payloads by channel chunk max size. My current shellcode is a twin shellcode with eggfinders. I spam the kernel payload and user payload, and if user payload is called first it will egghunt for the kernel payload.
6. After channel hole is filled and the NPP is spammed up with shellcode, trigger the free by closing the socket.
TODO:
* You can use the scanner methodology to detect x86/x64, but I'm still not sure how to detect OS, other than XP nominally will not use SSL and 7 will.
* The whole thing needs to be swapped to the Ruby version. Tom Sellers client is nicer and works for XP whereas this python client will not (when I wrote this module it was still in progress)
* Write the XP/2003 portions grooming MS_T120.
* Can we detect if RDPSND grooming is working or not?
* Any channels besides RDPSND/MS_T120 work for the grooming? (I've gone through about 10 books on NT RDP and reversed enough to doubt it)
https://github.com/0xeb-bp/bluekeep .. this repo has code for grooming MS_T120 on XP... should be same process as the RDPSND
2019-09-19 06:02:21 -05:00
Metasploit
0e9a2d13ac
automatic module_metadata_base.json update
2019-09-18 22:12:28 -05:00
Brent Cook
4af0731f8c
Land #12320 , Add correct CVE for shopware module
2019-09-18 22:04:12 -05:00
James Lee
fc69bfcc6c
Merge branch 'h00die-egypt_resolve_hosts' into resolve_hosts_save_names
2019-09-18 16:49:56 -05:00
Metasploit
ce8e85d573
automatic module_metadata_base.json update
2019-09-18 15:08:40 -05:00
Adam Cammack
a8da66e6ee
Land #12343 , Fix ps1 and powershell transform
2019-09-18 14:59:25 -05:00
Adam Cammack
2716687f0d
Bump rex-text to 0.2.24
2019-09-18 14:58:21 -05:00
James Lee
440c82b3e2
Fix broken ps1 and powershell transform
2019-09-18 12:20:16 -05:00
hkerma
98c9654d19
created a 'docs' directory in /tools. Added a tool to find missing documentations and/or modules
2019-09-18 16:09:53 +02:00
sinn3r
a386b2d503
Land #12176 - Add evasion module applocker_evasion_regasm_regsvcs
...
Add evasion module applocker_evasion_regasm_regsvcs
2019-09-17 10:20:56 -05:00
Metasploit
18f21bb3a7
Bump version of framework to 5.0.49
2019-09-16 09:21:03 -05:00
Tim W
4d9780f070
Land #12239 , fix search path separator
2019-09-13 17:08:57 +08:00
Jay Turla
b879a888f8
Indent everything in super to 2 spaces
2019-09-13 09:32:21 +08:00
Clément Notin
d85297c556
jboss_vulnscan: report the URL ("app") concerned by message
2019-09-13 01:04:28 +02:00
Metasploit
de1bf2e715
automatic module_metadata_base.json update
2019-09-12 17:49:21 -05:00
Wei Chen
97fbfa3a9f
Land #12154 , Add evasion module applocker_evasion_presentationhost
2019-09-12 17:41:01 -05:00
todb-r7
a9a2ce2f6a
Add correct CVE for shopware module
...
In PR #11828 , the module author requested, and got, a new CVE for this
issue. The module should reflect that.
2019-09-12 16:09:32 -05:00
Clément Notin
b8a393ea89
jboss_vulnscan: prefix fingerprint by 'fingerprint: '
2019-09-12 22:57:57 +02:00
Metasploit
f48a065d6d
Bump version of framework to 5.0.48
2019-09-12 12:05:18 -05:00
Jay Turla
6771dd4c16
Update mazda_ic_mover.md
2019-09-13 00:11:38 +08:00
Pearce Barry
580f4f93bc
Land #12308 , move bigdecimal fix to separate file
...
include for specs
2019-09-12 09:32:08 -05:00
Metasploit
c62cb1691c
automatic module_metadata_base.json update
2019-09-12 07:55:14 -05:00
Shelby Pace
e21b25b20f
Land #12302 , add zip slip exploit
2019-09-12 07:45:51 -05:00
Shelby Pace
644988750e
change permission on payload
2019-09-12 07:43:54 -05:00
Jay Turla
f0ca2fb2e5
Create a documentation for mazda_ic_mover module
2019-09-12 17:40:23 +08:00
Jay Turla
5fa9c5e21a
Update mazda_ic_mover.rb
...
Changed ```0x10``` to ```0x01```
2019-09-12 12:49:45 +08:00
Metasploit
469f848b22
automatic module_metadata_base.json update
2019-09-11 16:06:43 -05:00
Shelby Pace
408d01cef4
Land #12276 , add OpenEMR auxiliary module
2019-09-11 15:58:01 -05:00
Shelby Pace
8bfdaf6ab7
change metadata indentation
2019-09-11 15:56:46 -05:00
Brent Cook
3a4887cb3a
Land #12315 , update code climate banners
2019-09-11 13:37:31 -05:00
Clément Notin
88bdb981ad
jboss_vulnscan: prefix fingerprint by 'rhost' and 'rport'
2019-09-11 19:54:32 +02:00
Jeffrey Martin
c088ec9ee8
update code climate banners
2019-09-11 12:48:57 -05:00
Clément Notin
2ccfbbe8f8
RHOSTS: fix syntax in doc examples
2019-09-11 19:22:37 +02:00
Clément Notin
ecb5eec969
RHOSTS: test for accept both "file://<path>" and "file:<path>" syntax
2019-09-11 19:04:53 +02:00
Metasploit
c2790d44f6
automatic module_metadata_base.json update
2019-09-11 11:54:31 -05:00
sinn3r
cfeaca6de8
Land #12310 , Add CVE info for jboss_vulnscan and jboss_status
...
jboss_vulnscan and jboss_status: add CVE information
2019-09-11 11:47:05 -05:00
Clément Notin
911d3c41cd
RHOSTS: accept both "file://<path>" and "file:<path>" syntax
2019-09-11 18:45:59 +02:00
Jay Turla
b3240a1819
Add mazda_ic_mover module that moves the instrument cluster
...
This module moves the needle of the accelorometer and speedometer of the Mazda 2 instrument cluster
2019-09-12 00:07:42 +08:00
Will Porter
3ed9fb0383
Fix a bug caused by writing python code in a ruby file.
2019-09-11 15:39:15 +00:00
Metasploit
3483881b19
automatic module_metadata_base.json update
2019-09-11 10:36:39 -05:00
Wei Chen
a63357c460
Land #12177 , Add evasion module applocker_evasion_workflow_compiler
2019-09-11 10:28:16 -05:00
Clément Notin
b460dc113d
jboss_vulnscan & status: add CVE ref
2019-09-11 14:05:21 +02:00
William Porter
11021e3bc1
Update the documentation to reflect recent changes.
2019-09-10 21:53:06 -04:00
William Porter
262e574fe2
Add the .csv extension to the loot file.
2019-09-10 21:32:03 -04:00
William Porter
7a8eb76a12
Use the same gsub pattern to create the ltype as is used by store_loot to sanitize characters.
2019-09-10 21:14:15 -04:00
Brent Cook
e4992c6817
move bigdecimal fix to separate file, include for specs
...
This fixes some noisy warnings about bignum when running specs, making it easier to see the real problems.
2019-09-10 18:40:14 -05:00
bwatters-r7
6703e9b06b
Land #11984 , add meterpreter keyevent api for virtual key strokes
...
Merge branch 'land-11984' into upstream-master
2019-09-10 14:32:43 -05:00
Wei Chen
8fe1f9d172
Rephrase
2019-09-10 12:12:46 -05:00
William Porter
832d2e4300
Remove unneccesary comment.
2019-09-10 12:29:55 -04:00
Will Porter
3fc0467484
Update modules/auxiliary/sqli/openemr/openemr_sqli_dump.rb
...
Remove unused path variable.
Co-Authored-By: Shelby Pace <40177151+space-r7@users.noreply.github.com >
2019-09-10 12:27:48 -04:00
Will Porter
f1f9597222
Update modules/auxiliary/sqli/openemr/openemr_sqli_dump.rb
...
Use `normalize_uri` to construct the vulnerable URI.
Co-Authored-By: Shelby Pace <40177151+space-r7@users.noreply.github.com >
2019-09-10 12:27:22 -04:00
Metasploit
e66179a0e7
automatic module_metadata_base.json update
2019-09-10 11:24:33 -05:00
bwatters-r7
ee660d61ea
Land #12275 , Update payloads to 1.3.77
...
Merge branch 'land-12275' into upstream-master
2019-09-10 11:14:56 -05:00
Brent Cook
73eab2c34a
Land #12286 , RDP lib: lower SSL security level for compatibility with older implementations
2019-09-09 23:11:15 -05:00
Brent Cook
902ff4f573
Land #12301 , fix a few issues using/building Docker images
2019-09-09 23:04:10 -05:00
Brent Cook
f24c689d84
fix compatibility with --chown flag with COPY
2019-09-09 23:02:26 -05:00
Brent Cook
d874f1899d
update lock for unpinned gem
2019-09-09 22:52:54 -05:00
Wei Chen
2cd8125a40
Add zip skip
2019-09-09 12:00:53 -05:00
Wei Chen
5e65685167
Update documentation for zip slip
2019-09-09 12:00:05 -05:00
Matúš Bursa
9297809b41
fix permissions bug Gemfile.lock
...
There was an error while trying to write to /usr/src/metasploit-framework/Gemfile.lock. It is likely that you need to grant write permissions for that path.
2019-09-09 12:59:19 +02:00
Metasploit
0cbfaccc7d
automatic module_metadata_base.json update
2019-09-08 00:09:39 -05:00
Brendan Coles
aaad280e13
Land #12294 , Fix References Array for bypassuac modules
2019-09-08 05:04:03 +00:00
AZSG
a990191f99
Update modbusclient.rb
2019-09-07 23:54:43 -05:00
h00die
054a092eb2
fix references in bypassuac modules
2019-09-08 00:42:21 -04:00
h00die
78c4bfee95
add url for fodhelper
2019-09-08 00:33:16 -04:00
h00die
f60e8a3dbd
less indents
2019-09-08 00:11:11 -04:00
h00die
ce5f8d8d2f
add datastore option
2019-09-08 00:06:49 -04:00
h00die
d6cfe021dc
Land #12291 log errors on payload loading issues
2019-09-07 23:55:39 -04:00
h00die
d25d8e77b8
12291 sempervictus words
2019-09-07 23:54:19 -04:00
Clément Notin
579ea56f3b
RDP_TLS_SECURITY_LEVEL default value is 0 (less secure)
2019-09-07 18:39:59 +02:00
Clément Notin
49a991891c
Add RDP_TLS_SECURITY_LEVEL advanced option
2019-09-07 17:19:59 +02:00
Brent Cook
a985da9318
expand scope of errors caught to include all StandardErrors
2019-09-07 07:38:37 -04:00
Brent Cook
1d91e7f53c
make payload generation failures at boot time non-fatal
...
Currently, if any payload fails to generate that has a dynamic size, it causes a Framework instance to throw an exception on start. This can happen for a number of reasons, and more often than not it is enviromental (files missing, Y2k38 bugs, etc.). Instead of failing entirely, catch the exception and log as an error, don't register the payload, but continue booting.
2019-09-07 07:21:40 -04:00
gkweb76
795e0ebeb5
Restore a "print" to "print_good"
...
Aesthetics modification
2019-09-07 09:02:04 +02:00
AZSG
edcddf2736
Update modbusclient.rb
2019-09-06 22:40:31 -05:00
Clément Notin
d4e2ac696a
RDP lib: lower SSL security level for compatibility with stock Win7
2019-09-07 01:17:22 +02:00
Metasploit
9a6830c0ad
automatic module_metadata_base.json update
2019-09-06 12:10:24 -05:00
bwatters-r7
25b56c410d
Land #12189 , Add module for LibreNMS CVE-2019-10669
...
Merge branch 'land-12189' into upstream-master
2019-09-06 12:01:09 -05:00
Metasploit
2ec2ecb969
automatic module_metadata_base.json update
2019-09-06 10:22:57 -05:00
Shelby Pace
c4bd91f505
Land #12272 , add October CMS file upload
2019-09-06 10:13:33 -05:00
Shelby Pace
b0625012c4
add vulnerable software version
2019-09-06 10:12:08 -05:00
Shelby Pace
5f7c243b48
add filedropper, fix check, add to docs
2019-09-06 09:49:09 -05:00
Metasploit
788e3b4363
automatic module_metadata_base.json update
2019-09-06 09:33:59 -05:00
bwatters-r7
17acaf9720
Land #12226 , fix #11574 , add WSReset.exe UAC Bypass
...
Merge branch 'land-12226' into upstream-master
2019-09-06 09:19:24 -05:00
Touhid M Shaikh
aaebec01a4
Update References
...
Added CVE and Blog link
2019-09-06 18:26:28 +05:30
bwatters-r7
e2815a997b
Land #12251 , Unify SSL cert generate interfaces
...
Merge branch 'land-12251' into upstream-master
2019-09-05 16:45:31 -05:00
gkweb76
a2d2475618
Fixed wrong previous commit
2019-09-05 22:12:33 +02:00
gkweb76
88d424cf3f
Make the modification suggested by @acammack-r7
...
Directly insert the new value in the "table", instead of modifying the screen output manually. Simpler and cleaner, thanks @acammack-r7 !
2019-09-05 21:44:18 +02:00
Metasploit
22182d5c8d
automatic module_metadata_base.json update
2019-09-05 13:25:28 -05:00
Touhid M Shaikh
cf4c10783a
Update modules/exploits/multi/http/october_upload_bypass_exec.rb
...
Co-Authored-By: Shelby Pace <40177151+space-r7@users.noreply.github.com >
2019-09-05 23:50:18 +05:30
Touhid M Shaikh
4b416bf530
Update modules/exploits/multi/http/october_upload_bypass_exec.rb
...
Co-Authored-By: Shelby Pace <40177151+space-r7@users.noreply.github.com >
2019-09-05 23:48:43 +05:30
Touhid M Shaikh
a7e205e252
Update modules/exploits/multi/http/october_upload_bypass_exec.rb
...
Co-Authored-By: Shelby Pace <40177151+space-r7@users.noreply.github.com >
2019-09-05 23:48:32 +05:30
Touhid M Shaikh
0e4e7dd9d9
Update modules/exploits/multi/http/october_upload_bypass_exec.rb
...
Co-Authored-By: Shelby Pace <40177151+space-r7@users.noreply.github.com >
2019-09-05 23:48:22 +05:30
Touhid M Shaikh
bc1610ec46
Update modules/exploits/multi/http/october_upload_bypass_exec.rb
...
Co-Authored-By: Shelby Pace <40177151+space-r7@users.noreply.github.com >
2019-09-05 23:48:14 +05:30
Tim W
9f03db4582
Land #12280 , add WSReset.exe UAC bypass via registry
2019-09-06 02:14:54 +08:00
Tim W
1a717a5624
minor fixes
2019-09-06 02:11:06 +08:00
Metasploit
ea6ab34c32
Bump version of framework to 5.0.47
2019-09-05 12:13:53 -05:00
bwatters-r7
20216ac81a
Fix documentation to new module name
2019-09-05 12:08:12 -05:00
Tim W
5123fdbb5e
s/pkexec_helper_ptrace/ptrace_traceme_pkexec_helper/g
2019-09-06 01:00:44 +08:00
bwatters-r7
a1f39e519f
Move documentation
2019-09-05 11:57:51 -05:00
bwatters-r7
4e5e29fb52
Update documentation
2019-09-05 11:56:32 -05:00
Tim W
cc9d9bb483
s/bypassuac_windows_store/bypassuac_windows_store_filesys/g
2019-09-06 00:52:13 +08:00
bwatters-r7
481c13ea0f
Rubocop changes
2019-09-05 11:44:00 -05:00
bwatters-r7
cf3f6c90f8
Renamed file to make room for the other UAC bypass targeting the same exe
2019-09-05 11:35:10 -05:00
bwatters-r7
b876afa20f
Fixed up the code before pushing it.
2019-09-05 11:33:05 -05:00
Metasploit
56b0d57548
automatic module_metadata_base.json update
2019-09-05 11:28:50 -05:00
Adam Cammack
598cf35e1e
Land #12271 , Don't mangle staged x86, x64 payloads
2019-09-05 11:18:45 -05:00
James Lee
56d81052e8
Save the data we just collected
...
Instead of just throwing it away after printing.
2019-09-05 09:47:04 -05:00
bwatters-r7
9281c0de12
Add some missing pieces to the UAC pypass?
2019-09-04 17:03:32 -05:00
Adam Cammack
2ee5ec97e4
Use smallest stager size
...
Since these stagers can shrink based on the expected size of the next
stage, do our best to anticipate a small size. This makes the cached
payload size consistent for now, though if the x64 mettle stager grows
past 128 bytes I think we'll see the stager start oscillating in size
again. If you run into that and are reading this, sorry :(
2019-09-04 16:06:44 -05:00
Adam Cammack
4d89dd83e3
Update payload cached size
...
For real this time?
2019-09-04 15:17:34 -05:00
Adam Cammack
de554b315a
Update cached size
2019-09-04 14:56:12 -05:00
Adam Cammack
bb0f1b02ac
Fully golf the x86 read size
2019-09-04 14:54:48 -05:00
Will Porter
106913f631
Correct csv string.
2019-09-04 17:43:34 +00:00
Touhid M Shaikh
b9e702458d
Update documentation/modules/exploit/multi/http/october_upload_bypass_exec.md
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-09-04 23:01:44 +05:30
Metasploit
ccd6895365
automatic module_metadata_base.json update
2019-09-04 12:16:18 -05:00
William Porter
2cd93cc097
Update documentation and actually save loot as csv file.
2019-09-04 13:08:49 -04:00
Shelby Pace
490800f834
Land #11643 , add Awind SNMP RCE
2019-09-04 12:06:36 -05:00
Shelby Pace
8dbb41ee5b
remove extra line
2019-09-04 12:04:46 -05:00
Will Porter
1b9bb964b8
Adjust loot filename.
2019-09-04 16:56:28 +00:00
William Porter
0ee3324535
Use store_loot properly, check response.nil? before consuming body.
2019-09-04 12:21:59 -04:00
William Porter
50f5d80328
Fix code highlighting in documentation description.
2019-09-04 11:09:05 -04:00
Will Porter
c433cd4007
Remove erroneous ? from URI path.
2019-09-04 15:04:56 +00:00
Will Porter
74647c314a
Use Rex::Text.rand_text_alphanumeric and remove gsub as a weak excuse for encoding.
2019-09-04 07:53:36 +00:00
Touhid M Shaikh
71c1c07b0d
fixed
...
fix EOF on 88 line
2019-09-04 13:08:26 +05:30
William Porter
5963bbd6f9
Remove broken include.
2019-09-04 03:30:13 -04:00
William Porter
d0803e49be
Make changes as suggested in the pull request reviews.
2019-09-04 03:18:58 -04:00
Touhid M Shaikh
aeaf4232fe
updated
...
typo, comments and check fixed
2019-09-04 12:46:31 +05:30
Touhid M Shaikh
5e63c83257
Update modules/exploits/multi/http/october_upload_bypass_exec.rb
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-09-04 12:37:21 +05:30
Touhid M Shaikh
9179ce1de1
Update documentation/modules/exploit/multi/http/october_upload_bypass_exec.md
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-09-04 12:32:23 +05:30
Touhid M Shaikh
90b639da71
Update documentation/modules/exploit/multi/http/october_upload_bypass_exec.md
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-09-04 12:32:15 +05:30
Touhid M Shaikh
974f078114
Update modules/exploits/multi/http/october_upload_bypass_exec.rb
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-09-04 12:29:32 +05:30
Touhid M Shaikh
bb8b3245a3
Update modules/exploits/multi/http/october_upload_bypass_exec.rb
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-09-04 12:28:59 +05:30
Touhid M Shaikh
f0eb7da43b
Update modules/exploits/multi/http/october_upload_bypass_exec.rb
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-09-04 12:28:51 +05:30
Touhid M Shaikh
7359e4bdd6
fixes suggested by @space-r7
...
fixed check before passing to the accessor, removed res which is not used.
2019-09-04 12:20:39 +05:30
RageLtMan
04e750024c
Clean up linux/x86/rev_tcp asm per acammack
...
Push read_size to edx as suggested by Adam, optimize shellcode a
bit by selecting using dx instead of edx for sizes under 64K.
Testing:
Internal only, creates session on every try instead of every 5th.
2019-09-04 01:51:54 -04:00
William Porter
2b97522b69
Fix the CVE format based on failed tests.
2019-09-04 01:36:20 -04:00
William Porter
80aee24d65
Add an auxiliary module to exploit OpenEMR CVE CVE-2018-17179.
...
Dump all tables in the OpenEMR database and save the data in .csv
format in the loot directory.
2019-09-04 01:18:54 -04:00
bwatters-r7
49c7fe8906
Update payload cache size
2019-09-03 18:25:26 -05:00
bwatters-r7
06a7267017
Bump payload version
2019-09-03 18:13:01 -05:00
Metasploit
b1f58b4606
automatic module_metadata_base.json update
2019-09-03 14:26:02 -05:00
bwatters-r7
a520b62df3
Land #12273 , Require msf/core/handler/bind_tcp
...
Merge branch 'land-12273' into upstream-master
2019-09-03 14:15:59 -05:00
RageLtMan
80522a5712
Clean up linux/x64/rev_tcp asm per acammack
...
Address Adam's comments on the PR - remove redundantly pushed
size from mmap section.
2019-09-03 15:01:52 -04:00
Touhid M Shaikh
6c6603bbd7
Update modules/exploits/multi/http/october_upload_bypass_exec.rb
...
Co-Authored-By: Shelby Pace <40177151+space-r7@users.noreply.github.com >
2019-09-03 23:18:31 +05:30
Touhid M Shaikh
aee17608cd
Update modules/exploits/multi/http/october_upload_bypass_exec.rb
...
Co-Authored-By: Shelby Pace <40177151+space-r7@users.noreply.github.com >
2019-09-03 23:17:50 +05:30
Touhid M Shaikh
6934af0b7d
Update modules/exploits/multi/http/october_upload_bypass_exec.rb
...
Co-Authored-By: Shelby Pace <40177151+space-r7@users.noreply.github.com >
2019-09-03 23:15:33 +05:30
Shelby Pace
bcd181c87d
require bind tcp
2019-09-03 09:14:34 -05:00
Clément Notin
72672c82f9
Fix syntax
2019-09-03 15:17:28 +02:00
Tim W
ac9b4c137c
add compile.rb
2019-09-03 18:46:13 +08:00
Tim W
415caafabe
add docs
2019-09-03 17:54:15 +08:00
Tim W
bade8bfc48
add live compiling
2019-09-03 17:31:04 +08:00
Touhid M Shaikh
c9b0054629
october_upload_bypass_exec Doc
...
october_upload_bypass_exec Documetation
2019-09-03 12:26:41 +05:30
Touhid M Shaikh
615661a03d
first build
...
first build of october_upload_bypass_exec
2019-09-03 12:04:38 +05:30
RageLtMan
97943261ed
Linux x86 reverse_tcp should read known # of bytes
...
See notes for x64.
This part does not appear to be working properly yet - stages
generated with this commit recv 102b on the first call to read(),
but subsequently things seem to go off the rails after the
intermediate stage is loaded.
Needs testing and fixup at present for x86 (no worse than before
in terms of success rate however).
2019-09-03 01:55:12 -04:00
RageLtMan
05944ba8c1
Linux x64 reverse_tcp should read known # of bytes
...
The linux x64 reverse tcp stager is hardcoded to read 4K off the
socket. When a small intermediate stager is used, this can result
in reading part of the next stage as well, which means that the
intermediate stager will never recv the # of bytes it needs and
hang indefinitely.
Break out the mettle piece to use separate methods for assembly and
binary payload generation as well as actually putting the product
on the existing session socket.
Change the first part of the stage to check for the intermediate
stager generation method, and use the size of the produced stager
in the recvfrom call or fall back to the prior 4K read size.
Testing:
None yet
Ping @bcook-r7, @acammack-r7, @OJ, @ZeroSteiner
2019-09-03 01:27:27 -04:00
gkweb76
13560e93c0
Improve ADSI GPO filter to return only one result
2019-09-02 20:15:00 +02:00
Metasploit
288bb56c7f
automatic module_metadata_base.json update
2019-09-02 12:41:31 -05:00
h00die
ea50149ba7
land #12212 linux LPE ktsuss exploit
2019-09-02 13:32:45 -04:00
h00die
4b9e748882
ktsuss misc fixes
2019-09-02 13:31:30 -04:00
Metasploit
86d6b34da8
automatic module_metadata_base.json update
2019-09-02 10:56:25 -05:00
h00die
f1ec0da154
land #12263 fixing a bug in unattend
2019-09-02 11:22:57 -04:00
h00die
5b89c221f0
land #11799 linux local priv esc for cached sudo privs
2019-09-02 11:12:21 -04:00
Brendan Coles
3dc68cfaaa
Fix #12262
2019-09-01 18:51:13 +00:00
Tim W
cd13a83eb2
add arch check
2019-08-31 20:54:18 +08:00
gkweb76
71b825ee06
Update gpp.rb to display GPO name
...
GPO files on SYSVOL do only include the GPO GUID, not the GPO name defined by the administrator. This modification makes this gpp module make an ADSI query to retrieve all of the domain's GPOs, and compare their GUID. If one GUID matches, then we know the GPO name and we can display it. On a pentest, a client is much more interested by knowing the GPO name rather than the obscure GUID. The ADSI query relies on meterpreter "extapi" extension.
2019-08-31 12:37:49 +02:00
Metasploit
ea14054c0d
Bump version of framework to 5.0.46
2019-08-30 16:09:29 -05:00
Jeffrey Martin
40da748cd8
Land #12254 , realname calls in the cache to fullname
2019-08-30 16:02:13 -05:00
Adam Cammack
b98327472a
Correct realname calls in the cache to fullname
2019-08-30 15:38:45 -05:00
Metasploit
378b685478
Bump version of framework to 5.0.45
2019-08-30 14:15:42 -05:00
Adam Cammack
40169c8d42
Update to fixed rex-socket
...
Pulls in https://github.com/rapid7/rex-socket/pull/19
2019-08-30 14:02:57 -05:00
William Vu
6f58981396
Land #12244 , cisco_ucs_scpuser exploit
2019-08-30 13:35:50 -05:00
William Vu
83de041894
Land #12243 , cisco_ucs_rce exploit
2019-08-30 13:35:29 -05:00
William Vu
789c017135
Land #12059 , cisco_dcnm_download aux module
2019-08-30 13:35:00 -05:00
William Vu
042c181f67
Land #12058 , cisco_dcnm_upload_2019 exploit
2019-08-30 13:33:19 -05:00
Metasploit
89317ec87c
automatic module_metadata_base.json update
2019-08-30 13:32:25 -05:00
William Vu
a66fa7d79d
Land #12133 , CVE-2019-1663 RV{110,215}W targets
2019-08-30 13:23:00 -05:00
Pedro Ribeiro
e36308e5bb
Add FD ref
2019-08-31 00:18:46 +07:00
Pedro Ribeiro
d422a2e4b1
add fd link
2019-08-31 00:18:20 +07:00
William Vu
b0b72892be
Deprecate/delete cisco_rv130_rmi_rce by alias
2019-08-30 12:03:43 -05:00
Metasploit
23e6c46ea9
automatic module_metadata_base.json update
2019-08-30 12:03:25 -05:00
William Vu
49b3af3870
Merge remote-tracking branch 'upstream/master' into pr/12133
2019-08-30 12:01:48 -05:00
Brent Cook
c1be4a7ad3
Land #12252 , update .mailmap
2019-08-30 11:52:22 -05:00
Brent Cook
cc9a2a1668
update current employees
2019-08-30 11:50:56 -05:00
William Vu
2ea5e90764
Land #12223 , module deprecation by alias
2019-08-30 11:36:50 -05:00
Adam Cammack
991639c493
Unify SSL cert generate interfaces
...
After this and rex-socket#19 the interfaces should be compatible again.
2019-08-30 00:01:55 -05:00
Metasploit
c00ef799b4
Bump version of framework to 5.0.44
2019-08-29 12:11:39 -05:00
Pedro Ribeiro
139a4a490f
Create cisco_ucs_scpuser.md
2019-08-29 22:58:24 +07:00
Pedro Ribeiro
1ae21a411f
Create cisco_ucs_rce.md
2019-08-29 22:52:30 +07:00
Pedro Ribeiro
542c75d59e
Create cisco_dcnm_download.md
2019-08-29 22:49:11 +07:00
Pedro Ribeiro
23d7a0ed2b
Create cisco_dcnm_upload_2019.md
2019-08-29 22:45:03 +07:00
dwelch-r7
6afe0fc43b
Add dwelch to mailmap
2019-08-29 16:43:10 +01:00
Pedro Ribeiro
0c1f3f2d03
make some adjustments
2019-08-29 19:50:01 +07:00
Pedro Ribeiro
40b0d02f39
make some adjustments
2019-08-29 19:49:37 +07:00
Pedro Ribeiro
3dd9c38fd1
Update cisco_dcnm_upload_2019.rb
2019-08-29 12:42:01 +07:00
Pedro Ribeiro
bbbf426ec7
make requested changes
2019-08-29 12:16:58 +07:00
Pedro Ribeiro
f9ddc1d18f
Make more changes
2019-08-29 12:15:20 +07:00
Pedro Ribeiro
bda1120cac
make requested changes
2019-08-29 11:14:40 +07:00
Pedro Ribeiro
b96d9c75ac
make requested changes
2019-08-29 11:05:57 +07:00
Pedro Ribeiro
c88ce55013
Add github link
2019-08-28 11:08:35 +07:00
Pedro Ribeiro
98efac5bfb
Add github link
2019-08-28 11:08:01 +07:00
Pedro Ribeiro
7fd56f5fb3
Add Cisco UCS scpuser exploit
2019-08-28 11:00:08 +07:00
Pedro Ribeiro
d6f47fd03a
s/Directory/Director
2019-08-28 10:58:41 +07:00
Pedro Ribeiro
1aad95f7c4
Add exploit for Cisco UCS RCE
2019-08-28 10:55:49 +07:00
Pedro Ribeiro
804412f9d6
Merge pull request #10 from rapid7/master
...
AAAA
2019-08-28 10:54:05 +07:00
Clément Notin
caafac3455
meterpreter, fs/file.rb: use client's separator instead of '\\'
2019-08-27 18:12:47 +02:00
Clément Notin
f8b7100565
meterpreter UI, fs.rb: use client's separator instead of '\\'
2019-08-27 17:58:51 +02:00
Adam Cammack
bcccfd86b8
Teach module cache about realname
...
Also uses the class refname where appropriate since an instances refname
reflects the alias currently in use and if a module is reloaded while
using an alias the old behavior would generate spurious cache entries
that would not be cleaned up or modified. Specifically, this could
register a self-referential alias that would cause a stack overflow when
trying to `use` such an alias.
Additionally, some other `fullname`s were changed to `realname`s for
clarity.
2019-08-26 13:26:48 -05:00
Tim W
ea3e2c1047
fix #11574 , add WSReset UAC Bypass
2019-08-24 13:35:40 +08:00
Metasploit
9ea327ecdd
automatic module_metadata_base.json update
2019-08-23 10:32:40 -07:00
Shelby Pace
413cd7194d
Land #12064 , add Exim Local Privesc module
2019-08-23 12:23:53 -05:00
Metasploit
d551b88600
automatic module_metadata_base.json update
2019-08-23 07:06:06 -07:00
Jacob Robles
e628fb4afa
Land #12219 , Add Webmin password_change.cgi backdoor exploit
2019-08-23 08:46:24 -05:00
Adam Cammack
6a8f6d7a57
Unify spec and lib
2019-08-22 18:03:13 -05:00
Adam Cammack
8aa00d97aa
Add new moved_from to moved module
2019-08-22 17:58:20 -05:00
William Vu
901943c90f
Move Ubiquiti AirOS exploit from SSH to HTTP
2019-08-22 17:58:20 -05:00
William Vu
67b427f277
Remove expired deprecated modules
2019-08-22 17:58:20 -05:00
Adam Cammack
948918dacb
Use alias when reloading aliased module
...
Also speeds up module reloads by avoiding module instance creating
without a type.
Fixes #12026
2019-08-22 17:58:20 -05:00
Adam Cammack
d8e8a33b46
Rewrite Msf::Module::Deprecated w/ alerts, aliases
...
Less janky, and allows module moves without copying!
2019-08-22 17:58:20 -05:00
Adam Cammack
969ad7aa8a
Add Msf::Module::Alert for alerting users
2019-08-22 17:58:20 -05:00
Metasploit
1c4d9cfff6
Bump version of framework to 5.0.43
2019-08-22 10:08:14 -07:00
Metasploit
c000625815
automatic module_metadata_base.json update
2019-08-21 15:58:25 -07:00
William Vu
dff2aed1ac
Simplify request by combining POST parameters
...
There's no need to discriminate between versions. Send 'em all.
2019-08-21 17:50:48 -05:00
OJ
071626ed34
Land #12186 - Add RDP Fingerprinting
2019-08-22 08:44:08 +10:00
William Vu
d56e7d47b5
Add "analysis"
2019-08-21 17:05:40 -05:00
William Vu
856bf22597
Add module doc
2019-08-21 16:56:23 -05:00
William Vu
6b8c0bc589
Simplify targets with automatic targeting
2019-08-21 16:41:41 -05:00
William Vu
3f4c0e972b
Refactor check and support 1.900-1.920 targets
2019-08-21 16:16:56 -05:00
William Vu
227ea6de3a
Fix typo
2019-08-21 15:41:45 -05:00
William Vu
55b5e6a616
Drop =~ habit
2019-08-21 11:55:03 -05:00
William Vu
a6d7011efa
Adjust check
2019-08-21 11:42:49 -05:00
William Vu
5de2b37110
Add diff3 output between 1.{890,930,920}
2019-08-21 11:17:12 -05:00
Brent Cook
cb66828b78
Land #12221 , Fix RPC console.create database active check
2019-08-21 09:02:51 -05:00
Matthew Kienow
776c7268f5
Fix database active check
2019-08-21 09:35:15 -04:00
William Vu
c6f8dedf45
Add more words and an additional reference
2019-08-21 02:26:17 -05:00
William Vu
41d4dafdca
Add Webmin password_change.cgi backdoor exploit
2019-08-21 02:02:26 -05:00
Brent Cook
931607826a
Land #12218 , explicitly require factory_bot in spec helper
2019-08-20 07:52:18 -05:00
Brent Cook
40d11b2fdd
explicitly require factory_bot, see #12181
2019-08-20 06:54:34 -05:00
Brent Cook
262cd89859
Land #12168 , fix HTTP client redirects with SSL enabled
2019-08-20 04:03:37 -05:00
Brent Cook
bd90241192
set opts['SSL'] above for consistency
2019-08-20 04:03:10 -05:00
Brent Cook
d1b482366b
Land #12181 , add Juniper config parser tests
2019-08-20 03:48:16 -05:00
Brent Cook
95e69930a1
Land #12214 , enable TLS1.0 support for RDP lib
2019-08-20 03:36:19 -05:00
Metasploit
d1b939990b
automatic module_metadata_base.json update
2019-08-19 11:44:59 -07:00
Shelby Pace
bc6cff3d4f
Land #12207 , add LibreOffice/Logo file fmt exploit
2019-08-19 13:14:23 -05:00
Shelby Pace
8fd5c1e0c1
remove PrependMigrate option
2019-08-19 13:12:54 -05:00
Clément Notin
40b74211c9
RDP lib: accept TLS 1.0
2019-08-19 19:48:25 +02:00
Brendan Coles
9ce3365d56
Add documentation
2019-08-19 13:34:52 +00:00
Brendan Coles
ca82e6cd25
Add ktsuss suid Privilege Escalation module
2019-08-19 13:28:02 +00:00
Load
dc07b78dcd
@LoadLow Marks the generated ODT file readonly
2019-08-18 18:36:31 +02:00
Load
9b1a3b4033
Marks the generated ODT file readonly
...
Prevents autosave and further modifications after opening the document on the target system.
2019-08-18 17:59:25 +02:00
Load
e6b72b5b43
Cleanup odt metadata
...
Metadata part is not mandatory on ODT files
2019-08-18 17:51:36 +02:00
Load
6b4acbc3ac
Updates scenarios
2019-08-18 15:14:37 +02:00
Load
b0a531982e
Adds default options
...
- Changes target to Automatic
- Set default options instead of default target for options
- Adds links for the two vulnerabilities exploited by this module
- Removes unnecessary double encoding+eval
2019-08-18 14:42:48 +02:00
Load
6483b97c13
Merge pull request #1 from space-r7/pr12207-changes
...
Use Python instead of platform-dependent code
2019-08-18 14:38:26 +02:00
Shelby Pace
409b3c9c4b
using python payload for platform independence
2019-08-16 15:36:42 -05:00
Load
3838fc2164
Adds references to the next CVE
...
This new CVE explains this exploit (global events are used)
2019-08-16 12:59:23 +02:00
Load
7e44194251
References next CVE with global events
2019-08-16 12:54:01 +02:00
Metasploit
015651dd08
automatic module_metadata_base.json update
2019-08-15 17:08:06 -07:00
William Vu
b8b4edc243
Land #12203 , autofilter=false for a couple modules
2019-08-15 19:00:15 -05:00
Metasploit
8ad7fbf5f9
automatic module_metadata_base.json update
2019-08-15 16:54:23 -07:00
Brent Cook
d5115295af
Land #12205 , prefer https always
2019-08-15 18:42:14 -05:00
William Vu
fb6d5d603d
Update generate splat from http:// to https://
2019-08-15 18:11:39 -05:00
William Vu
32334c2386
Update all module splats from http:// to https://
2019-08-15 18:10:44 -05:00
Brent Cook
4d48515ae2
Disable a couple of modules for autoexploitation that produce false positives on newer systems.
2019-08-15 16:33:40 -05:00
Metasploit
adcc69a1ac
Bump version of framework to 5.0.42
2019-08-15 10:08:04 -07:00
Metasploit
fb4d2521ef
automatic module_metadata_base.json update
2019-08-15 08:37:42 -07:00
William Vu
76f526df99
Land #12202 , needs_cleanup for post modules
2019-08-15 10:29:31 -05:00
Brent Cook
3437ba758b
Land #12199 , fix invalid range backtrace when RHOSTS is invalid
2019-08-15 07:28:57 -05:00
bwatters-r7
1701dae701
Add needs_cleanup to the post module class so filedropper does not
...
crash everything trying to set that variable.
2019-08-15 07:27:28 -05:00
Brent Cook
ceb09ddf44
Land #12198 , fix training wheels for 'generate' command
2019-08-15 07:22:29 -05:00
William Vu
3aad5accac
Fix nil RangeWalker length for invalid range
...
reset returns false and doesn't initialize length.
2019-08-14 21:40:58 -05:00
William Vu
141350dbc1
Update help
2019-08-14 21:28:13 -05:00
William Vu
25a66a245f
Prefer import_options_from_s over manual parsing
2019-08-14 21:08:00 -05:00
William Vu
e20d9e8c4f
Fix another typo
2019-08-14 21:04:06 -05:00
William Vu
f81a326ac1
Fix typo
2019-08-14 20:43:40 -05:00
William Vu
a53fe44d8e
Properly parse option string anyway with -o
2019-08-14 20:32:53 -05:00
William Vu
45747c45f7
Remove extraneous -s NOP sled option
2019-08-14 20:32:31 -05:00
William Vu
e3463d0cd8
Prefer Rex::Text.dehex over Rex::Text.hex_to_raw
2019-08-14 20:32:30 -05:00
Shelby Pace
70d5bd4eb3
add default payload, check login
2019-08-13 13:39:15 -05:00
Shelby Pace
286263c094
add quotes, platform
2019-08-13 11:18:31 -05:00
Shelby Pace
48333c5d4e
randomize parameter value
2019-08-13 11:14:10 -05:00
William Vu
d676f98d56
Remove already included Msf::Exploit::Remote::Tcp
2019-08-13 10:56:03 -05:00
Adam Cammack
dbe856297a
Land #12188 , fix module authors script's full_name
2019-08-13 10:19:03 -05:00
Shelby Pace
da98d3d376
finish documentation and module
2019-08-13 09:47:24 -05:00
James Lee
760f4fc25d
Fix typo, full_name -> fullname
2019-08-12 19:30:43 -05:00
Shelby Pace
71f4eadd18
module rework and some documentation
2019-08-12 15:22:22 -05:00
Jacob Robles
e1e1cd9020
Land #12161 , Store opasswd password history
2019-08-12 09:22:50 -05:00
Spencer McIntyre
63dfa2a8bd
Fix the RDP NLA protocol detection
2019-08-11 19:23:29 -07:00
Spencer McIntyre
84669f567b
Add the RDP fingerprinting method to rdp_scanner
2019-08-11 16:20:14 -07:00
Spencer McIntyre
e8057b0b55
Add an initial fingerprinting method for rdp
2019-08-11 01:24:55 -07:00
h00die
a2160c84c6
juniper config parser tests
2019-08-10 09:39:26 -04:00
NickTyrer
a5bbd7d1f5
update documentation
2019-08-10 09:03:04 +01:00
Brendan Coles
47cfcba53a
Add documentation
2019-08-10 07:08:01 +00:00
Brendan Coles
9fdee466ca
Update ptrace_sudo_token_priv_esc
2019-08-10 07:03:23 +00:00
Shelby Pace
76da9ea4fc
get shell with test data
2019-08-09 08:40:41 -05:00
NickTyrer
4747049440
add documentation
2019-08-09 08:47:26 +01:00
NickTyrer
baea8d1f5f
add documentation
2019-08-08 21:14:02 +01:00
NickTyrer
373e409184
add module applocker_evasion_workflow_compiler
2019-08-08 18:48:10 +01:00
NickTyrer
320642e3c0
add module applocker_evasion_regasm_regsvcs
2019-08-08 18:36:36 +01:00
Metasploit
78e5536064
Bump version of framework to 5.0.41
2019-08-08 10:05:14 -07:00
Shelby Pace
9418f4bac2
Land #12032 , add Xymon gather info module
2019-08-08 10:55:40 -05:00
William Vu
f317987e02
Land #12175 , hadoop_unauth_exec NoMethodError fix
2019-08-07 22:44:55 -05:00
William Vu
b5fd9b4fed
Fix whitespace
2019-08-07 22:44:38 -05:00
Green-m
6cf0ff0678
Fix #12156 , NoMethodError in hadoop exploit.
2019-08-08 10:06:40 +08:00
Brent Cook
3ea79c4ccb
Land #12170 , add 'Crash' action to Bluekeep scanner to send DoS payload
2019-08-07 19:40:24 -05:00
Tom Sellers
46b6a5927e
Comment update
2019-08-07 19:25:43 -05:00
Tom Sellers
4861a139ca
Minor comments
2019-08-07 19:20:36 -05:00
Tom Sellers
9566334868
merge upstream/master
2019-08-07 19:11:58 -05:00
William Vu
de68af975b
Land #12171 , Msf::Exploit::Remote::RDP mixin
2019-08-07 17:03:14 -05:00
Tom Sellers
93e6ff67b4
Addressing feedback
2019-08-07 16:37:59 -05:00
Tom Sellers
2d5e9cb241
RDP: address feedback from wvu
2019-08-07 14:47:33 -05:00
Brent Cook
18da91a348
Add 'Crash' action for enabling the DoS
2019-08-07 11:38:14 -05:00
Tom Sellers
f78c6469b8
RDP: rubocop cleanup lib
2019-08-07 10:28:24 -05:00
Tom Sellers
de8cd38eb2
RDP: rubocop cleanup packets
2019-08-07 10:00:18 -05:00
Tom Sellers
7d30c92375
RDP: rubocop cleanup
2019-08-07 09:12:53 -05:00
Tom Sellers
b6956bd3be
RDP: moar migration
2019-08-07 08:50:01 -05:00
Tom Sellers
0c1868b158
RDP: migrate security nego to lib
2019-08-07 08:27:15 -05:00
Tom Sellers
7dc87bf8bc
RDP: Refactor protocol code
2019-08-07 07:25:42 -05:00
Tom Sellers
a63e0ba106
BlueKeep: Add DoS exploit
2019-08-06 20:15:53 -05:00
James Lee
3b7abfcaf2
Use correct case for SSL option
2019-08-06 15:25:34 -05:00
Tim W
979681443c
add rudimentary check method
2019-08-06 14:48:37 +08:00
Tim W
b35b4674d0
fix forking behaviour
2019-08-06 14:17:28 +08:00
Tim W
0c4fc639fa
update with bcoles poc.c
2019-08-06 13:55:01 +08:00
Tim W
f48d1b1231
add more links
2019-08-06 13:54:15 +08:00
Brendan Coles
efd6bec827
Store opasswd password history
2019-08-04 01:12:06 +00:00
NickTyrer
61a1abab79
update csproj arch targeting
2019-08-03 10:41:13 +01:00
LoadLow
2432104a8d
Update libreoffice_logo_exec.md
2019-08-03 06:24:04 +02:00
LoadLow
41822c0c1e
Update libreoffice_logo_exec.md
2019-08-03 06:15:19 +02:00
LoadLow
c3b6e33f2e
Adds suggested modifications
2019-08-03 06:10:11 +02:00
Load
ee6c4a906a
Update libreoffice_logo_exec documentation
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-08-03 05:53:40 +02:00
Load
dbced012ef
Update libreoffice_logo_exec documentation
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-08-03 05:53:29 +02:00
Load
ce552ab88b
Removes double quotes in libreoffice_logo_exec
...
Co-Authored-By: Carter Brainerd <0xCB@protonmail.com >
2019-08-03 05:52:12 +02:00
Load
5e2463c5d4
Update libreoffice_logo_exec documentation
...
Co-Authored-By: Carter Brainerd <0xCB@protonmail.com >
2019-08-03 05:51:50 +02:00
Load
009e2afcfa
Update libreoffice_logo_exec documentation
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-08-03 05:51:30 +02:00
Pedro Ribeiro
eab38b8b21
make requested changes
2019-08-02 22:49:43 +01:00
Pedro Ribeiro
817726699c
make requested changes
2019-08-02 22:48:54 +01:00
William Vu
cbe4771d29
Land #12159 , EXITFUNC for pingback
2019-08-02 16:07:02 -05:00
bwatters-r7
c9d2013ddb
Change generate method to match single payloads.
2019-08-02 15:47:36 -05:00
William Vu
6572fa93c4
Land #12158 , needs_cleanup for on_new_session
2019-08-02 14:56:47 -05:00
William Vu
d9d48ffa91
Land #12152 , EOFError fix for BlueKeep scanner
2019-08-02 11:23:22 -05:00
Adam Cammack
e11de696d4
Make msftidy happy
2019-08-02 11:17:41 -05:00
bwatters-r7
20438614bb
Stupid extra line....
2019-08-02 11:11:19 -05:00
bwatters-r7
c6defb0264
Rubocop complaints and require_size additions
2019-08-02 11:09:14 -05:00
NickTyrer
f675a974a6
implement changes suggested by @cbrnrd
2019-08-02 16:29:08 +01:00
bwatters-r7
14ee5c4a4f
Update Windows payloads to support exitfunk
2019-08-02 10:28:57 -05:00
Adam Cammack
cf9b94a964
Set needs_cleanup flag for exploits that need it
...
The `needs_cleanup` flag needs to be set per-module when an exploit
needs an interactive session to clean up. Some `FileDropper` exploits
need additional cleanup to what the mixin provides, but since all
`FileDropper`s already mark themselves as needing cleanup those are not
covered here. A few of these could potentially be refactored to use the
original exploitation method to clean up or to compile the list of
files/commands to clean up ahead of time, but that is out of the scope
of this fix.
2019-08-02 10:23:53 -05:00
Adam Cammack
5e64f8560a
Fix whitespace
2019-08-02 10:23:41 -05:00
Quentin Kaiser
8085ad3046
Set default payload based on chosen target.
2019-08-02 10:47:28 +02:00
Quentin Kaiser
610bed8fd9
&& is preferred over and.
2019-08-02 10:41:14 +02:00
Jacob Robles
c4c0ed9187
Land #12155 , Fix printed CVE number
2019-08-01 18:01:53 -05:00
Jacob Robles
bbf0cb4d9d
Land #11653 , Apache Tika CVE-2018-1335 RCE
2019-08-01 17:43:57 -05:00
Metasploit
0e5a1278d4
Bump version of framework to 5.0.40
2019-08-01 14:56:07 -07:00
William Vu
178339db70
Rescue EOFError in quick check for patch
...
Thank you to @cnotin for noticing this case.
2019-08-01 15:03:36 -05:00
NickTyrer
af5e071abe
update documentation
2019-08-01 20:46:09 +01:00
Jacob Robles
ed0c064a24
Fix printed CVE number
2019-08-01 09:57:48 -05:00
NickTyrer
107bb3e9ff
add documentation
2019-08-01 09:06:35 +01:00
NickTyrer
c8050adab2
add module applocker_evasion_presentationhost
2019-08-01 08:40:30 +01:00
William Vu
8d2b29024a
Fix typo
2019-07-31 17:44:10 -05:00
Wei Chen
abc85e4266
Land #12130 , Add evasion module applocker_evasion_msbuild
2019-07-31 16:32:29 -05:00
Wei Chen
3a4ec6fe82
Cosmetic changes
2019-07-31 16:31:44 -05:00
Shelby Pace
bc3f87a950
add login and device id code
2019-07-31 16:31:22 -05:00
William Vu
ae13736d50
Rescue EOFError in cve_2019_0708_bluekeep get_once
2019-07-31 16:01:20 -05:00
Jeffrey Martin
2e06b4e93f
Land #12126 , Implement "set PAYLOAD" by index
2019-07-31 14:50:20 -05:00
Jeffrey Martin
a3245f5ac9
Land #12150 , Accidentally removed include that is sort of imperative....
2019-07-31 09:09:53 -05:00
bwatters-r7
36ae16df74
Accidentally removed include that is sort of imperative....
2019-07-31 08:46:01 -05:00
LoadLow
8e8e6a2cf7
Fixes indent
2019-07-31 00:14:08 +02:00
Brent Cook
6bd7f6cb4a
Land #12148 , lock bcrypt to arm compatibe version
2019-07-30 17:07:34 -05:00
LoadLow
88f3ff9d59
Updates references
2019-07-31 00:00:30 +02:00
Jeffrey Martin
e6c025811b
Lock bcrypt gem until armhf support is restored.
...
Updates in 3.1.13 can cause native gem compile to fail due to
https://github.com/codahale/bcrypt-ruby/issues/201 .
2019-07-30 16:47:26 -05:00
LoadLow
97589e534e
Updates documentation for libreoffice_logo_exec
2019-07-30 23:37:06 +02:00
LoadLow
b2dcaf6c4a
Adds documentation for libreoffice_logo_exec
2019-07-30 23:34:54 +02:00
LoadLow
5f478b7fd6
Adds exploit module for CVE-2019-9848
...
uses on dom-loaded event (triggered just after opening the document) and still working on 6.2.5
2019-07-30 23:07:20 +02:00
h00die
060183c034
tika 1.15-1.17
2019-07-30 16:55:06 -04:00
bwatters-r7
fb7f30e60d
Land #12129 , Add Pingback Payloads
...
Merge branch 'land-12129' into upstream-master
2019-07-30 12:06:57 -05:00
Adam Cammack
517d32b082
Update payload cache sizes
2019-07-30 10:34:47 -05:00
Adam Cammack
23ea772076
Golf Ruby pingback payload syntax
2019-07-30 10:32:31 -05:00
Adam Cammack
e6ea0c9fd7
Use binascii for Python pingback UUID encoding
...
This gives us compatibility for Python 3.x and 1.x
2019-07-30 10:18:24 -05:00
Adam Cammack
3cb1b4588b
Golf Python payload variable names
2019-07-30 10:14:41 -05:00
h00die
f053768801
restrict tika versions
2019-07-30 07:32:30 -04:00
bwatters-r7
79e17d0dda
Remove unsupported options
2019-07-29 21:38:20 -05:00
bwatters-r7
05ffa6e4a0
More updates, optimizations, and style fixes
2019-07-29 16:29:32 -05:00
NickTyrer
4f7e9bd47c
update file creation
2019-07-29 20:29:11 +01:00
bwatters-r7
d6dc397b21
Fix bugs introduced by syntax changes.
2019-07-29 14:00:09 -05:00
bwatters-r7
6bf10e1f91
Fixups for syntax
2019-07-29 11:55:51 -05:00
h00die
8f95ccc83d
Land #12135 move docs to right locations
2019-07-29 12:15:31 -04:00
h00die
4ad1eaebd9
docs touchup
2019-07-29 12:09:47 -04:00
Shelby Pace
1faa1786c6
add test request
2019-07-29 10:28:07 -05:00
Metasploit
bd2a1812a6
automatic module_metadata_base.json update
2019-07-28 21:21:14 -07:00
Brent Cook
5b8a75f544
Land #12119 , Add OS X post module to manage Sonic Pi
2019-07-28 23:12:26 -05:00
Metasploit
d08a1d1ac0
automatic module_metadata_base.json update
2019-07-28 20:09:16 -07:00
sinn3r
fe664da890
Land #12131 , Cast to_s in command_shell.rb
...
Cast to_s - Fix #11725
2019-07-28 21:56:25 -05:00
Wei Chen
2f4da50912
Land #12132 , Catch EOFError in alphastor_devicemanager_exec.rb
...
Fix #12061
2019-07-28 21:54:38 -05:00
Wei Chen
537e12a5ac
Land #12134 , Fix typo in payload_inject
2019-07-28 21:52:09 -05:00
Wei Chen
2f720a1f26
Land #12137 , Update setting new .exe of Sophos AV
2019-07-28 21:49:31 -05:00
Wei Chen
86b0b7b0e9
Land #12140 , correct output printing bug from smb_enumshares
2019-07-28 21:46:58 -05:00
Wei Chen
c47caec03f
Land #12107 , Add module Redis Unauthenticated Code Execution
2019-07-28 21:40:03 -05:00
Wei Chen
63de0051f4
Cosmetic changes
2019-07-28 21:38:54 -05:00
ines
4856e0f87d
remove call for to_ascii on share_type
2019-07-28 10:19:58 +02:00
GabrielMioranza
4d6f16eac1
Update setting new .exe of Sophos AV
...
Add .exe used by Sophos AV Endpoint
2019-07-27 16:47:05 -03:00
caleBot
e9e57895cd
Update enum_nagios_xi.md
...
Added description
2019-07-27 11:33:51 -06:00
breeh
c48a43a771
Adding post module for dumping credentials out of NagiosXI
2019-07-27 11:22:58 -06:00
PingouinRF
5b78788fff
Moved documentation files mssql_sql.md and mssql_idf.md from documentation/modules/auxiliary/scanner/mssql/ to /documentation/modules/auxiliary/admin/mssql/ to match which the module's directory
2019-07-27 19:05:17 +02:00
PingouinRF
1d67217b3d
renamed auxiliary/scanner/misc/java_jmx_scanner.md to java_jmx_server.md to match with the module's name
2019-07-27 19:03:32 +02:00
Francesco Soncina
b6b3a54b79
fix typo in payload_inject
...
:)
2019-07-27 19:02:33 +02:00
Quentin Kaiser
2e79314d7b
Updated documentation.
2019-07-27 11:09:34 +02:00
Quentin Kaiser
34c5277e4e
Deprecate module.
2019-07-27 10:49:59 +02:00
Quentin Kaiser
413da527ab
Module renaming.
2019-07-27 10:47:58 +02:00
Quentin Kaiser
18f7ae379b
Add support for RV110W and RV215W + check method to fingerprint devices.
2019-07-27 10:45:31 +02:00
NickTyrer
9279b5a40a
add documentation
2019-07-27 07:36:38 +01:00
Brendan Coles
d2bcab4346
Catch EOFError - Fix #12061
2019-07-26 23:53:46 +00:00
Brendan Coles
c3b7d0155a
Cast to_s - Fix #11725
2019-07-26 23:48:37 +00:00
Adam Cammack
bd6a0c872f
Remove workspace reqs from remote db payloads
...
The requirements had already been removed from local payloads in
865f214a85
2019-07-26 17:55:57 -05:00
William Vu
e6e3ec493b
Rename play_pattern_timed durations to beats
...
This is so I don't forget they're beats, not seconds. Also, "times"
already has special meaning in Ruby, so let's not confuse ourselves
further.
2019-07-26 17:41:24 -05:00
William Vu
42c2d78731
Remove fluff for better effect
2019-07-26 17:18:39 -05:00
bwatters-r7
cec29c6473
More fixes for syntax
2019-07-26 14:51:44 -05:00
NickTyrer
29627495e1
update format
2019-07-26 20:45:08 +01:00
NickTyrer
a329e36918
add evasion module applocker_evasion_msbuild
2019-07-26 20:16:29 +01:00
William Vu
61e9f2b5bf
Fix rhythm of melody section
...
Thanks for your ears, @busterb!
2019-07-26 14:09:57 -05:00
bwatters-r7
79b7bbd2cf
Update payload cache size and fix import bug
2019-07-26 13:52:36 -05:00
bwatters-r7
2f804faed9
Rubocop and @acammack cleanup suggestions
2019-07-26 12:36:59 -05:00
asoto-r7
99d6842915
Land #12124 , Add HttpRawHeaders (file) advanced option to HttpClient
2019-07-26 11:37:10 -05:00
Brent Cook
463c147977
fix method check in metadata updates
2019-07-25 23:23:20 -05:00
bwatters-r7
93f8d94154
Changes to venom to handle pingbacks and really delete extra files, this time.
2019-07-25 19:45:10 -05:00
bwatters-r7
e710c93363
Remove async callback stuff for later work and change db checks
2019-07-25 19:45:10 -05:00
bwatters-r7
4a59c1be26
Other pry...
2019-07-25 19:45:10 -05:00
bwatters-r7
cd4ba1318a
Unpry
2019-07-25 19:45:10 -05:00
bwatters-r7
8af6cad862
fix copy/pasta error on payload data read
2019-07-25 19:45:10 -05:00
bwatters-r7
9ed8aa9411
update the read/write for pingback data
2019-07-25 19:45:10 -05:00
bwatters-r7
7a8090c3e7
Fix variable name
2019-07-25 19:45:10 -05:00
bwatters-r7
3536e8a0a9
Remove extra assignments elsewhere
2019-07-25 19:45:10 -05:00
bwatters-r7
68f7ece9a1
Removed superfluous assignment and populated datastore with pingback_uuid
...
for payloads that require the pingbackvalue to be in the datastore.
2019-07-25 19:45:10 -05:00
asoto-r7
af285340ea
Copy-pasta badness
2019-07-25 19:45:10 -05:00
asoto-r7
b0d602e0df
Added autoload entries for AsyncCallback
2019-07-25 19:45:10 -05:00
bwatters-r7
2aadd6317b
Fix printing in session handler while I'm at it...
2019-07-25 19:45:10 -05:00
bwatters-r7
e1ba4bd7ed
delete extra file
2019-07-25 19:45:10 -05:00
bwatters-r7
7c2d214af2
Clean up debugging, move options to one place and delete superflous file
...
change the uuid handing to prevent changes to it when it gets put in payloads
2019-07-25 19:45:05 -05:00
bwatters-r7
6ae3f97c4a
Maybe include the super pingback type in the payloads?
2019-07-25 19:44:11 -05:00
bwatters-r7
310533f96c
First stab at filtering payloads that require cleanup
2019-07-25 19:44:09 -05:00
bwatters-r7
80dbef20f2
Follow acammack's guidance for excluding filedropped exploits
...
usage of pingback payloads
2019-07-25 19:43:14 -05:00
asoto-r7
14039b18b1
Correctly fixed json_to_mdm_object (thanks @mkienow-r7 for the catch)!
2019-07-25 19:43:14 -05:00
asoto-r7
26257fabef
Updated json_to_mdm_object() calls, removing third parameter
2019-07-25 19:43:14 -05:00
asoto-r7
72977e6ff9
pingback: Removing seemingly unnecessary 'generate_raw' method
2019-07-25 19:43:14 -05:00
asoto-r7
9b6d4587a4
cmd/unix/pingback_bind: Add resiliency to netcat, per wvu's suggestion
2019-07-25 19:43:14 -05:00
asoto-r7
88213f1e6f
Pingback: Addressed some comments and suggestions
2019-07-25 19:43:14 -05:00
bwatters-r7
f098a836e9
Stupid pry...
2019-07-25 19:43:14 -05:00
bwatters-r7
949b356f09
Update the session to die after callback
...
Remove stale old file
2019-07-25 19:43:14 -05:00
asoto-r7
a12f9a5e4c
Revert f162822
2019-07-25 19:43:14 -05:00
bwatters-r7
398a5dcce1
Reset send_uuid because it should not have been changed
...
remove debug print from options
change puts on pingback
2019-07-25 19:43:14 -05:00
asoto-r7
53447462bd
Remove a left-over 'pry' debugger invocation
2019-07-25 19:43:14 -05:00
bwatters-r7
374b56de89
Should not have changed reverse_tcp.rb
2019-07-25 19:43:14 -05:00
asoto-r7
8f0aaa70a6
cmd/unix/pingback_* payloads now use 'printf' in place of 'echo'
2019-07-25 19:43:13 -05:00
asoto-r7
7778ada271
Remove workspace reference in async_callback database table
2019-07-25 19:43:13 -05:00
bwatters-r7
33513bd947
Undo changes to windows/bind_tcp
2019-07-25 19:43:13 -05:00
bwatters-r7
39f193e649
Stupid last trailing space
2019-07-25 19:43:13 -05:00
bwatters-r7
3e765090e2
Fix some spacing
2019-07-25 19:43:13 -05:00
bwatters-r7
08a765df81
Shut up, nmsftidy.... I hope
2019-07-25 19:42:51 -05:00
bwatters-r7
f7f7e969ee
Hold off on venom changes for a new PR
2019-07-25 19:42:51 -05:00
bwatters-r7
2a242d9b19
Add the new file
2019-07-25 19:42:51 -05:00
bwatters-r7
e1e75d87e9
Code deduplication
2019-07-25 19:42:51 -05:00
asoto-r7
cb270cd57a
WIP: Adding default pingback payload to parent check method
2019-07-25 19:42:50 -05:00
asoto-r7
92fa8f4377
Clean up requires and includes
2019-07-25 19:42:50 -05:00
asoto-r7
79c45a6c52
Clean up require's and calculate CachedSize
2019-07-25 19:42:50 -05:00
asoto-r7
58f3a067ab
cmd/unix/pingback_reverse and cmd/unix/pingback_bind
2019-07-25 19:42:50 -05:00
bwatters-r7
9989c731d0
That's better.....
2019-07-25 19:42:50 -05:00
bwatters-r7
c866e0aff6
First swing at x86 windows reverse_tcp pingback
...
Still issues with the looping and counters.
2019-07-25 19:42:50 -05:00
bwatters-r7
e51e271c92
Remove extra stuff that was part of the staged attempt at pingback.
...
It is no longer required because pingback is now a single.
2019-07-25 19:42:50 -05:00
asoto-r7
be011da9f9
Ruby pingback payload (bind and reverse)
2019-07-25 19:42:50 -05:00
asoto-r7
4241d3384c
Python pingback payload (reverse only)
2019-07-25 19:42:50 -05:00
asoto-r7
1d45c3a176
python pingback_bind_tcp: send UUID as raw bytes instead of ASCII
2019-07-25 19:42:50 -05:00
asoto-r7
89913924f6
Remove 'workspace' option from Mdm::Payload.create
2019-07-25 19:42:50 -05:00
asoto-r7
94c6ee3f7b
Python pingback payload (bind only)
2019-07-25 19:42:26 -05:00
asoto-r7
247f246475
Linux pingback payloads
2019-07-25 19:42:26 -05:00
Aaron Soto
f4fa70da0a
Add error handling for users without a database configured
2019-07-25 19:42:26 -05:00
Aaron Soto
8c6f2d974b
Enable database support in msfvenom to allow for saving UUIDs
2019-07-25 19:42:26 -05:00
Aaron Soto
6d6b33968f
Record UUID upon pingback_reverse_tcp generation and callback
2019-07-25 19:42:26 -05:00
Aaron Soto
3b54fb30dd
Record UUID upon reverse_tcp_pingback generation and callback
2019-07-25 19:42:26 -05:00
bwatters-r7
1b64b9f984
Fix odd edge case converting binary to hex string
2019-07-25 19:42:26 -05:00
bwatters-r7
5202a85cd8
Use nonvolitile register for the counter
...
Change option name to match convention
2019-07-25 19:42:26 -05:00
bwatters-r7
d626e5641d
Updated to have a handler
2019-07-25 19:42:26 -05:00
bwatters-r7
9805a14875
Add support for pingback as a single and session...
2019-07-25 19:42:26 -05:00
bwatters-r7
cc69fa286f
Let's try it as a single this time....
2019-07-25 19:42:26 -05:00
bwatters-r7
4ca6c35053
Add new files
2019-07-25 19:42:26 -05:00
bwatters-r7
e798a0dcf0
Add pingback changes
2019-07-25 19:42:25 -05:00
bwatters-r7
f0f45d9882
Maybe stage the new files, too
2019-07-25 19:42:25 -05:00
Aaron Soto
542bf00771
REST API for async-callbacks, removed array datatypes, cleaned up Swagger
2019-07-25 19:42:25 -05:00
Aaron Soto
67d3bf5e01
WIP: REST API for async-callbacks, added UUID search
2019-07-25 19:42:25 -05:00
Aaron Soto
353e8e6be9
WIP: Remove PUT and DELETE endpoints
2019-07-25 19:42:25 -05:00
Aaron Soto
a1b51361b0
Bring pingback-payload changes into public framework
2019-07-25 19:42:25 -05:00
Aaron Soto
47ee86ac11
WIP: REST API for async-callbacks
2019-07-25 19:42:25 -05:00
Jeffrey Martin
5134dbd94e
Land #12127 , Revert pingback
2019-07-25 17:14:21 -05:00
Brent Cook
109c0d0a9b
Revert "automatic module_metadata_base.json update"
...
This reverts commit 5a5f3a88b7 .
undelete module metadata as well
2019-07-25 16:54:41 -05:00
Brent Cook
38b98dc6f7
Revert "Land #11903 , initial implementation of "pingback" payloads"
...
This reverts commit 3bd3dfc86e , reversing
changes made to d7bc50fb25 .
There is an issue with module cache builds when this is present that needs to be addressed.
2019-07-25 16:44:09 -05:00
Metasploit
5a5f3a88b7
automatic module_metadata_base.json update
2019-07-25 14:14:25 -07:00
William Vu
0d041df91f
Actually test command shell support and fix it
2019-07-25 15:09:35 -05:00
William Vu
da188502e4
Update method name for indexing from a list
...
Module-specific code was moved back into modules.rb and core.rb.
2019-07-25 14:26:42 -05:00
PingouinRF
65c9568623
Merge pull request #1 from rapid7/master
...
Updating from upstream
2019-07-25 20:45:30 +02:00
Brent Cook
3bd3dfc86e
Land #11903 , initial implementation of "pingback" payloads
2019-07-25 12:17:04 -05:00
Metasploit
d7bc50fb25
Bump version of framework to 5.0.39
2019-07-25 10:05:33 -07:00
bwatters-r7
0537ea1f6c
Changes to venom to handle pingbacks and really delete extra files, this time.
2019-07-25 11:02:48 -05:00
Metasploit
4bbf5768c8
automatic module_metadata_base.json update
2019-07-25 07:30:09 -07:00
Wei Chen
f09cfade62
Land #11205 , Add support for Linux and pubprn.vbs to web_delivery
2019-07-25 09:15:40 -05:00
bwatters-r7
709a9c2156
Remove async callback stuff for later work and change db checks
2019-07-25 09:08:22 -05:00
William Vu
a22ad9ad42
Templatize HttpRawHeaders with ERB
2019-07-24 21:23:22 -05:00
William Vu
40b040b3e6
Cache "show payloads" and set PAYLOAD by index
2019-07-24 20:15:12 -05:00
William Vu
29d6c270d4
Fix setting PAYLOAD clearing target DefaultOptions
2019-07-24 17:38:14 -05:00
bwatters-r7
2f9e638b01
Other pry...
2019-07-24 17:15:20 -05:00
bwatters-r7
01b200bafa
Unpry
2019-07-24 16:58:44 -05:00
bwatters-r7
bb1981462c
fix copy/pasta error on payload data read
2019-07-24 16:06:52 -05:00
bwatters-r7
a84fb40a4b
update the read/write for pingback data
2019-07-24 15:36:33 -05:00
William Vu
1ba0d1ee5b
Once more, with feeling
2019-07-24 14:59:12 -05:00
William Vu
7730b510c1
Update HttpHeaders to HttpRawHeaders to match desc
2019-07-24 14:52:56 -05:00
William Vu
800737690a
Add HttpHeaders file advanced option to HttpClient
2019-07-24 13:15:44 -05:00
Metasploit
4ca7808ed9
automatic module_metadata_base.json update
2019-07-23 11:38:46 -07:00
Wei Chen
8f8e32b246
Land #11795 , Add evasion module applocker_evasion_install_util
2019-07-23 13:30:33 -05:00
Wei Chen
261759da11
Cosmetic changes
2019-07-23 13:28:15 -05:00
Metasploit
9f37381500
automatic module_metadata_base.json update
2019-07-23 10:29:47 -07:00
Wei Chen
967b2a018f
Land #12010 , Add exploit module for wp-database-backup Wordpress plugin
2019-07-23 12:21:23 -05:00
Wei Chen
ca664512ce
Minor corrections in check and a unsed return value
2019-07-23 12:20:14 -05:00
Metasploit
adeef68617
automatic module_metadata_base.json update
2019-07-23 09:04:22 -07:00
Wei Chen
6dfcaedf02
Land #12116 , cisco docs and bug fixes
2019-07-23 10:49:25 -05:00
William Vu
6448775d52
Land #12121 , rex-text update to 0.2.22 for XOR
2019-07-23 10:17:08 -05:00
William Vu
0decb34f28
Bump rex-text gem to 0.2.22 for XOR enhancements
2019-07-23 02:35:11 -05:00
Metasploit
f689b457ac
automatic module_metadata_base.json update
2019-07-23 00:24:14 -07:00
William Vu
65bdd53962
Land #12033 , xor_context hostname-keyed encoder
2019-07-23 02:14:03 -05:00
William Vu
a952fc303b
Fix play_pattern_timed
2019-07-22 23:53:24 -05:00
William Vu
3bc65b0e9e
Play it like a real band
2019-07-22 22:23:44 -05:00
William Vu
3eb3ab1db2
Add side effects
2019-07-22 18:56:23 -05:00
William Vu
e5e283a1dc
Fix another module doc
2019-07-22 18:52:54 -05:00
William Vu
5688db10a3
Add module doc
2019-07-22 18:52:44 -05:00
William Vu
283f9d2e08
Add OS X Manage Sonic Pi post module
2019-07-22 18:46:02 -05:00
Metasploit
72b40c676a
automatic module_metadata_base.json update
2019-07-22 16:09:37 -07:00
asoto-r7
6b60832988
Land #12095 , Ahsay backup v7.x - v8.1.1.50 file upload
2019-07-22 18:01:32 -05:00
asoto-r7
77a17f37e7
Land #12108 , Prefer Rex::Text.dehex over hex_to_raw in msfvenom
2019-07-22 17:17:43 -05:00
bwatters-r7
182700da44
Fix variable name
2019-07-22 15:14:30 -05:00
bwatters-r7
787c346af2
Remove extra assignments elsewhere
2019-07-22 15:01:33 -05:00
Metasploit
20b650ec74
automatic module_metadata_base.json update
2019-07-22 12:56:03 -07:00
William Vu
dd4033be49
Land #12111 , nmod fix for non-scanner aux RHOSTS
...
Credit to @fd0 for finding the bug in java_rmi_registry.
2019-07-22 14:40:46 -05:00
bwatters-r7
6396bccf63
Removed superfluous assignment and populated datastore with pingback_uuid
...
for payloads that require the pingbackvalue to be in the datastore.
2019-07-22 13:59:57 -05:00
Shelby Pace
030ac60fce
Land #12084 , Add Schneider Encoder Exploit
2019-07-22 12:49:44 -05:00
Shelby Pace
0293e74190
remove extra lines
2019-07-22 12:28:47 -05:00
Shelby Pace
6a2ae1418a
format xml, change headers
2019-07-22 12:24:55 -05:00
Wietsman
3b08ed88d1
#12095 added version check if vulnerable
...
#12095 cleaned up the code
#12095 added more output
#12095 added comments
2019-07-22 16:43:24 +02:00
h00die
0c510ca428
cisco spec w/ more usernames
2019-07-21 21:59:04 -04:00
h00die
f19ddc11e8
cisco docs and bug fixes
2019-07-21 20:57:47 -04:00
Green-m
9203a0adf0
Fix typo in #11551 to solve aux rhosts issue.
2019-07-21 19:54:44 +08:00
Green-m
e71b92aa60
We are not evil!
2019-07-21 09:33:18 +08:00
Wietsman
71da3b7903
#12095 Added cleaning up of trial account and dropper files.
2019-07-21 03:21:15 +02:00
vitorespf
d498eaceaf
Update modules/exploits/unix/http/schneider_electric_net55xx_encoder.rb
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-07-20 01:17:55 -03:00
vitorespf
bfa17a05b4
Update schneider_electric_net55xx_encoder.rb
2019-07-20 00:44:21 -03:00
vitorespf
af7eba5828
Update modules/exploits/unix/http/schneider_electric_net55xx_encoder.rb
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-07-20 00:07:24 -03:00
vitorespf
a70a74d480
Update schneider_electric_net55xx_encoder.rb
2019-07-19 23:41:31 -03:00
vitorespf
3c57741794
Update schneider_electric_net55xx_encoder.rb
2019-07-19 23:38:45 -03:00
vitorespf
836805b3cd
Update modules/exploits/unix/http/schneider_electric_net55xx_encoder.rb
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-07-19 23:37:18 -03:00
vitorespf
c0377c97c5
Update schneider_electric_net55xx_encoder.rb
2019-07-19 23:31:10 -03:00
William Vu
8ef76684ab
Prefer Rex::Text.dehex over Rex::Text.hex_to_raw
...
The former allows character literals interleaved with escaped hex.
2019-07-19 18:06:59 -05:00
asoto-r7
4b27eddad2
Copy-pasta badness
2019-07-19 14:14:39 -05:00
asoto-r7
fe9efd5dac
Added autoload entries for AsyncCallback
2019-07-19 14:04:38 -05:00
vitorespf
e1e89882d6
Update modules/exploits/unix/http/schneider_electric_net55xx_encoder.rb
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-07-19 14:08:34 -03:00
vitorespf
f1a6c0cc45
Update modules/exploits/unix/http/schneider_electric_net55xx_encoder.rb
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-07-19 14:08:09 -03:00
Green-m
07f3c074d4
Add doc and enhance the module.
2019-07-20 00:17:57 +08:00
vitorespf
68818aa4c7
Update schneider_electric_net55xx_encoder.rb
2019-07-19 10:30:05 -03:00
vitorespf
5732880db6
Update documentation/modules/exploit/unix/http/schneider_electric_net55xx_encoder.md
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-07-19 10:08:33 -03:00
vitorespf
460e83eb81
Update documentation/modules/exploit/unix/http/schneider_electric_net55xx_encoder.md
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-07-19 09:56:51 -03:00
vitorespf
be791e551c
Update documentation/modules/exploit/unix/http/schneider_electric_net55xx_encoder.md
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-07-19 09:56:33 -03:00
vitorespf
ea3932e31b
Update modules/exploits/unix/http/schneider_electric_net55xx_encoder.rb
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-07-19 09:55:19 -03:00
vitorespf
4a2388cad7
Update documentation/modules/exploit/unix/http/schneider_electric_net55xx_encoder.md
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-07-19 09:54:49 -03:00
vitorespf
5f3f6f5b3f
Update documentation/modules/exploit/unix/http/schneider_electric_net55xx_encoder.md
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-07-19 09:54:34 -03:00
vitorespf
6f656e51c4
Add files via upload
2019-07-19 09:21:21 -03:00
Tim W
b258b8270e
fix #12104 , add CVE-2019-13272 PTRACE_TRACEME linux local exploit
2019-07-19 13:24:13 +08:00
bwatters-r7
6be5067b6c
Catch public branch up with private
2019-07-18 16:08:40 -05:00
bwatters-r7
b89df1b3eb
Fix printing in session handler while I'm at it...
2019-07-18 15:53:05 -05:00
bwatters-r7
66ff0af096
delete extra file
2019-07-18 15:45:41 -05:00
bwatters-r7
91ffeaa354
Clean up debugging, move options to one place and delete superflous file
...
change the uuid handing to prevent changes to it when it gets put in payloads
2019-07-18 15:44:20 -05:00
Metasploit
c0033987b0
Bump version of framework to 5.0.38
2019-07-18 10:04:30 -07:00
vitorespf
7a552369df
Update schneider_electric_net55xx_encoder.rb
2019-07-18 10:40:31 -03:00
Wietsman
e26b650f31
#12095 Fixed Password complexity generation
...
#12095 Fixed trial account creation
#12095 Fixed calling functions
2019-07-18 13:13:39 +02:00
Guillaume Andre
395e4d2424
Update documentation. Register options by alphabetical order.
...
Change-Id: I46bb3701107a504dddbf030e0345d7adc83bafac
2019-07-18 10:45:44 +01:00
Wietse Boonstra
2b7d6e07b1
#12095 Fixed issue with function naming.
...
Added random username and password generating
2019-07-18 10:54:12 +02:00
Shelby Pace
61d5be5981
add module skeleton and check
2019-07-17 15:51:11 -05:00
bwatters-r7
2ebc2c10aa
Maybe include the super pingback type in the payloads?
2019-07-17 14:13:42 -05:00
bwatters-r7
f2ed823516
First stab at filtering payloads that require cleanup
2019-07-17 13:23:20 -05:00
Wietsman
c28bff8435
#12095 Added documentation
2019-07-17 12:55:18 +02:00
Green-m
b6697f5016
Add redis rce module and data stuff.
...
To do:
1. Check env of system and compiler.
2. Add a compiled so file to be compatible with windows and mac.
3. Add doc.
2019-07-17 15:33:02 +08:00
vitorespf
20e79e08dc
Update schneider_electric_net55xx_encoder.rb
2019-07-16 22:26:18 -04:00
vitorespf
6f21abfe08
Update schneider_electric_net55xx_encoder.rb
2019-07-16 22:16:34 -04:00
vitorespf
6897d2ce17
Update schneider_electric_net55xx_encoder.rb
2019-07-16 22:03:46 -04:00
vitorespf
4ee745e21e
Update schneider_electric_net55xx_encoder.rb
2019-07-16 21:52:28 -04:00
vitorespf
c3fbd63654
Update schneider_electric_net55xx_encoder.rb
2019-07-16 21:45:06 -04:00
vitorespf
55cc66f893
Update schneider_electric_net55xx_encoder.rb
...
Breaking xmlPayload into multiple lines
2019-07-16 21:27:15 -04:00
h00die
08a0528d8a
add aux file eater module
2019-07-16 20:52:00 -04:00
Wietsman
26c87b1869
Wrap to 80 columns
2019-07-17 00:21:21 +02:00
Wietsman
73c6a11ccb
Apply suggestions from code review
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-07-16 22:38:58 +02:00
Wietsman
2d86312f6c
Apply suggestions from code review
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-07-16 22:37:56 +02:00
Wietsman
ac454d3044
Ahsay backup v7.x - v8.1.1.50 file upload
2019-07-16 16:10:13 +02:00
Metasploit
182c8a23f4
automatic module_metadata_base.json update
2019-07-15 09:40:43 -07:00
Wei Chen
27bb166938
Land #12011 , Add module for cve-2018-8453
2019-07-15 11:31:07 -05:00
vitorespf
07834d7355
Update modules/exploits/unix/http/schneider_electric_net55xx_encoder.rb
...
Co-Authored-By: Shelby Pace <40177151+space-r7@users.noreply.github.com >
2019-07-15 12:00:24 -03:00
Metasploit
8ef4cca49f
automatic module_metadata_base.json update
2019-07-15 07:52:11 -07:00
vitorespf
38f17b4062
Update modules/exploits/unix/http/schneider_electric_net55xx_encoder.rb
...
Co-Authored-By: Shelby Pace <40177151+space-r7@users.noreply.github.com >
2019-07-15 11:48:43 -03:00
vitorespf
10b402fd7b
Update modules/exploits/unix/http/schneider_electric_net55xx_encoder.rb
...
Co-Authored-By: Shelby Pace <40177151+space-r7@users.noreply.github.com >
2019-07-15 11:47:45 -03:00
Jacob Robles
5c0bbbbaa0
Land #12070 , Add module for CVE-2019-0841
2019-07-15 09:32:47 -05:00
yaumn
e51138fa4b
Establish a tcp connection to check for the exim version.
2019-07-13 22:45:21 +01:00
yaumn
764a4a0692
Improve check regex
2019-07-13 19:57:03 +01:00
yaumn
e2a9907e99
Add SendExpectTimeout option
2019-07-13 19:55:12 +01:00
yaumn
f465e43e34
Change tcp communication with meterpreter
2019-07-13 19:25:34 +01:00
Metasploit
5df104c2dc
automatic module_metadata_base.json update
2019-07-12 18:39:54 -07:00
William Vu
d1c6364d58
Land #12086 , joomla_registration_privesc check fix
2019-07-12 20:31:19 -05:00
William Vu
501a9109a5
Fix and refactor check method
2019-07-12 20:29:43 -05:00
Pedro Ribeiro
18f76f00b5
Rename modules/exploit/multi/http/cisco_dcnm_upload_2019.rb to modules/exploits/multi/http/cisco_dcnm_upload_2019.rb
2019-07-12 22:02:05 +01:00
Pedro Ribeiro
7386e416e6
Update and rename cisco_dcnm_upload_2019.rb to modules/exploit/multi/http/cisco_dcnm_upload_2019.rb
2019-07-12 22:01:29 +01:00
William Vu
2bc2b88ee6
vprint and quotes
2019-07-12 14:37:34 -05:00
Adam Cammack
ca2f86f633
Land #12087 , Use shell for passthrough commands
2019-07-12 14:02:51 -05:00
William Vu
77c0dacba2
Restore unknown_command passthrough to the shell
...
This continues to prefer system over popen, but it restores the original
behavior of shelling out, allowing the use of shell metacharacters, etc.
2019-07-12 13:39:37 -05:00
William Vu
be5f15a245
Add @h00die and @bcoles changes
2019-07-12 12:46:13 -05:00
William Vu
a586fda620
Land #12031 , Msf::Exploit::Remote::Tcp#shutdown
2019-07-12 12:26:25 -05:00
Metasploit
a46670b4cb
automatic module_metadata_base.json update
2019-07-12 07:46:12 -07:00
Jacob Robles
de40b3e1c4
Land #12062 , Add Laravel PHP RCE CVE-2018-15133
2019-07-12 09:28:33 -05:00
Jacob Robles
30d7c9427f
Add CVE reference
2019-07-12 09:08:15 -05:00
Jacob Robles
0f76729108
Update doc
2019-07-12 08:17:17 -05:00
bcoles
645b9179a2
Add support for pubprn
2019-07-12 23:16:43 +10:00
Jacob Robles
73b1790472
Use include? method
2019-07-12 07:59:30 -05:00
Jacob Robles
e84379cabe
Refactor
2019-07-12 07:45:24 -05:00
Guillaume Andre
60dbbb0455
Ensure temp files are deleted in every case
...
Change-Id: I53401e4bcce887048f433743a965421f93d699ba
2019-07-12 12:20:37 +01:00
bwatters-r7
a280d00612
Follow acammack's guidance for excluding filedropped exploits
...
usage of pingback payloads
2019-07-11 17:13:31 -05:00
Patrick Webster
f13378c503
Minor fix for aux joomla_registration_privesc
...
Module checks for version number. If disclosed, checks for vulnerable release ranges.
Missing a Safe retval for known immune numbers.
2019-07-12 06:37:08 +10:00
Metasploit
8c89c81525
automatic module_metadata_base.json update
2019-07-11 13:35:37 -07:00
asoto-r7
f13616843c
Land #12041 , Add Xymon useradm Command Execution module
2019-07-11 15:20:13 -05:00
Jeffrey Martin
60ffc3a954
Land #12085 , Fix is_payload_compatible? for nil payloads
2019-07-11 14:30:47 -05:00
William Vu
502a26bcbd
Fix is_payload_compatible? for nil payloads
2019-07-11 14:00:24 -05:00
vitorespf
925d894f22
Add files via upload
2019-07-11 14:10:37 -04:00
Metasploit
e6766c23a5
Bump version of framework to 5.0.37
2019-07-11 10:04:09 -07:00
Brent Cook
18b8974761
Land #11969 , deprecate db_rebuild_cache command
2019-07-11 11:02:17 -05:00
Guillaume Andre
642a71383d
Classic shell exploit now uses a bash script
...
Change-Id: I770cf9bcae5c5a265c19f2dc9e4a512e30705b6c
2019-07-11 17:01:23 +01:00
Guillaume Andre
565e18cbe8
Add a few checks
...
Change-Id: Ieca129a54d2105bf646e6f848cb5ecec804c372f
2019-07-11 14:20:21 +01:00
Guillaume Andre
6b8ee4e4f9
Fix typo
...
Change-Id: Ibde0c547fda37c38118d54c8dc219763e6e32f1f
2019-07-11 13:54:31 +01:00
Guillaume Andre
8e57599b95
Update documentation
...
Change-Id: Iaaed3de37d244d7c9fc81bd6d99bc5e4de6b050f
2019-07-11 13:52:08 +01:00
Pedro Ribeiro
fa75632c7e
Update cisco_dcnm_upload_2019.rb
...
Co-Authored-By: @shellfail <jrobles@rapid7.com >
2019-07-11 12:11:27 +01:00
Pedro Ribeiro
eebe13c1de
Update cisco_dcnm_upload_2019.rb
...
Co-Authored-By: @shellfail <jrobles@rapid7.com >
2019-07-11 12:11:16 +01:00
William Vu
2dcb646a16
Land #12080 , system vs. popen for unknown_command
2019-07-10 21:24:42 -05:00
Metasploit
05382849a4
automatic module_metadata_base.json update
2019-07-10 16:04:18 -07:00
Jeffrey Martin
612bd2fcca
Land 12079, No effing idea
2019-07-10 17:43:18 -05:00
Tod Beardsley
fbfa37916c
Tut tut
...
Edit a blue comment
2019-07-10 17:41:54 -05:00
Adam Cammack
b419ab018c
Gracefully handle passthrough commands
...
The `system` method handles input and output as appropriate, allowing
programs that need user input to execute properly without racing
msfconsole over STDIN
2019-07-10 17:40:49 -05:00
Metasploit
6f7c061bb0
automatic module_metadata_base.json update
2019-07-10 09:29:15 -07:00
yaumn
435240ed41
Update modules/exploits/linux/local/exim4_deliver_message_priv_esc.rb
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-07-10 17:24:48 +01:00
yaumn
074c73236a
Update modules/exploits/linux/local/exim4_deliver_message_priv_esc.rb
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-07-10 17:24:32 +01:00
yaumn
7812e0037b
Update modules/exploits/linux/local/exim4_deliver_message_priv_esc.rb
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-07-10 17:24:13 +01:00
yaumn
af89433c1d
Update modules/exploits/linux/local/exim4_deliver_message_priv_esc.rb
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-07-10 17:23:50 +01:00
yaumn
9ffbfe0985
Update modules/exploits/linux/local/exim4_deliver_message_priv_esc.rb
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-07-10 17:23:38 +01:00
yaumn
a06dffa174
Update modules/exploits/linux/local/exim4_deliver_message_priv_esc.rb
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-07-10 17:22:52 +01:00
yaumn
f1eda91003
Update documentation/modules/exploit/linux/local/exim4_deliver_message_priv_esc.md
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-07-10 17:22:38 +01:00
yaumn
8b54d0669d
Update documentation/modules/exploit/linux/local/exim4_deliver_message_priv_esc.md
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-07-10 17:22:26 +01:00
William Vu
4302c3f3b0
Land #12074 , missing split fix for #12072
2019-07-10 11:17:56 -05:00
William Vu
c917ec70d1
Fix missing split in struts2_rest_xstream
2019-07-10 11:15:36 -05:00
Metasploit
a25f9afc9f
automatic module_metadata_base.json update
2019-07-10 08:54:07 -07:00
William Vu
cd3ffb92ef
Land #12072 , cmd_psh_payload arch string fixes
2019-07-10 10:38:22 -05:00
Guillaume Andre
df28038279
Update documentation
...
Change-Id: I68d9e08695ed7cf0476d70030c1ff44c770c425b
2019-07-10 11:42:02 +01:00
Guillaume Andre
5d52b0326b
Add better checks at the beginning of the exploit.
...
Change-Id: Ib80907f03f15b6c0cf32b48f059cf042e4d6a91f
2019-07-10 11:33:09 +01:00
Metasploit
c5032df7fd
automatic module_metadata_base.json update
2019-07-09 17:52:33 -07:00
h00die
9274b1d259
Land #12024 , add gatherproof to ssh_login modules
2019-07-09 20:35:49 -04:00
Pedro Ribeiro
54b6e489a8
Add full disc link
2019-07-10 01:03:01 +01:00
Pedro Ribeiro
54f98cbdc3
Add full disc link
2019-07-10 01:02:41 +01:00
William Vu
e6300bfd63
Fix cmd_psh_payload requiring an arch string
...
We may want to update Rex::Powershell to take the first in an array.
2019-07-09 17:43:23 -05:00
Shelby Pace
70d67f1dbb
merged write_to_disk and load_dll_with_diaghub
2019-07-09 11:39:38 -05:00
Shelby Pace
86d0d1d153
remove validate_target
2019-07-09 10:52:02 -05:00
Guillaume Andre
b68383141c
Added Qualys and dhn to credits. Set suid bit of payload instead of shell launcher. Print detected exim version
...
Change-Id: I61805a4d2b6f7f8a268b677c3c6f1d76ada034da
2019-07-09 16:51:14 +01:00
Shelby Pace
f7aa6d79d7
Update modules/exploits/windows/local/appxsvc_hard_link_privesc.rb
...
Co-Authored-By: @shellfail <jrobles@rapid7.com >
2019-07-09 10:47:57 -05:00
Shelby Pace
c647d0ba52
made suggested change to write_payload
2019-07-09 10:46:46 -05:00
Shelby Pace
096857d1ad
swap check codes
2019-07-09 10:01:49 -05:00
Shelby Pace
f7c252eef3
move source to external/source directory
2019-07-09 09:08:28 -05:00
Jacob Robles
a55aea33a9
Add cve-2018-8453 exploit module
2019-07-09 07:15:13 -05:00
Shelby Pace
ccdb7ba262
remove unused variable
2019-07-08 12:57:47 -05:00
Shelby Pace
f0f1a41ba5
add documentation and module
2019-07-08 12:49:22 -05:00
h00die
b7df6c1272
juniper cisco local config eaters
2019-07-07 21:49:48 -04:00
Patrick Webster
163e85bad9
fail Spaces at EOL is effing stupid unless the line is exponentiall^y long.
2019-07-08 11:36:49 +10:00
Patrick Webster
a9ecef74fd
Guessing build fail must be this.
2019-07-08 09:30:52 +10:00
Patrick Webster
5a035aaf7c
Owch fix syntax.
2019-07-08 09:18:39 +10:00
yaumn
df46faf71f
Finish documentation. Exploit is stable.
2019-07-07 23:58:29 +01:00
Patrick Webster
691c606c53
Also some bare POSTs work.
2019-07-08 05:13:38 +10:00
Patrick Webster
a9791fad74
Added Lavarel PHP exploit module with fixes.
2019-07-08 00:50:13 +10:00
yaumn
7b2a1b67ed
Add a documentation file
2019-07-07 00:25:54 +01:00
Pedro Ribeiro
0f32f03dfd
Update cisco_dcnm_download.rb
2019-07-06 23:15:19 +08:00
Pedro Ribeiro
691dfeaf00
Add files via upload
2019-07-06 22:58:49 +08:00
Pedro Ribeiro
9465a3c143
Delete cisco_dcnm_download.rb
2019-07-06 22:58:28 +08:00
Pedro Ribeiro
f45ad6f30a
add exploit for CVE-2019-1621
2019-07-06 22:56:12 +08:00
Pedro Ribeiro
a33a981cdd
Add exploit for CVE-2019-1619
2019-07-06 22:51:42 +08:00
Pedro Ribeiro
c8419d9975
Merge pull request #9 from rapid7/master
...
aaa
2019-07-06 22:50:12 +08:00
yaumn
a5843e48a9
Basic reverse shell does not disconnect anymore
2019-07-06 00:53:33 +01:00
Guillaume Andre
4c2cacd7d6
Add meterpreter support
2019-07-05 16:53:39 +01:00
yaumn
2c8ad0e357
First tests with meterpreter sockets
2019-07-05 01:04:15 +01:00
yaumn
74eb74e606
Pipe method with netcat now works
2019-07-04 23:15:23 +01:00
h00die
0d1385d8d5
Merge pull request #12 from jrobles-r7/tika
...
Tika module updates, check and CmdStager
2019-07-04 13:38:29 -04:00
Metasploit
c1c600cbe8
Bump version of framework to 5.0.36
2019-07-04 10:10:16 -07:00
Guillaume Andre
e4c27d3eab
Clean pipe file
...
Change-Id: Ibc78639ad44eb56ffa26fcfb4f656b5a78dbf76a
2019-07-04 16:20:13 +01:00
Guillaume Andre
3c0b581371
Clean code
...
Change-Id: I83287dcd52c4ba566396a0ff7e4f3c3125d12bb0
2019-07-04 16:16:27 +01:00
Guillaume Andre
9b378ceb71
Add options. Add pipe netcat method
...
Change-Id: I0c401add1c2ff76e3e2c3d82a8fb7f74db405a1f
2019-07-04 15:02:03 +01:00
yaumn
bddfef0cac
Add options. Exploits now works with both setuid and nc methods
2019-07-04 00:16:28 +01:00
Shelby Pace
c69799262d
fixed issue with hard link exe
2019-07-03 15:44:00 -05:00
Shelby Pace
a83812ad55
add source code, compiled exe for diaghub loading
2019-07-03 14:32:22 -05:00
Guillaume Andre
a8e4510f53
Merge branch 'exim4-priv-esc' of github.com:yaumn/metasploit-framework into exim4-priv-esc
...
Change-Id: I6f14e91da0bc4bf692acaed1759540f4b5b5f908
2019-07-03 14:34:11 +01:00
yaumn
bb58160d10
Exploits now also works with netcat
2019-07-03 14:30:23 +01:00
yaumn
4f1d9af5fd
Add netcat method (still buggy though)
2019-07-03 14:30:23 +01:00
Guillaume Andre
a2411a1d63
First version of the exploit is now working
...
Change-Id: Idf6b6d773cf71c477fe68885313f5f98d74d9c11
2019-07-03 14:30:23 +01:00
Guillaume Andre
bef6425d0e
First commit
...
Change-Id: If751eb1753fc8991fe7971c7123a203734396a46
2019-07-03 14:30:23 +01:00
Brendan Coles
cd1669f2b2
Use identify_hash for creds
2019-07-03 08:33:26 +00:00
Brent Cook
0897849ddf
Land #12045 , lock rex-socket to 0.1.17
2019-07-02 16:55:54 -05:00
Metasploit
5eb339368f
automatic module_metadata_base.json update
2019-07-02 14:35:20 -07:00
Brent Cook
6ab02ba0bc
revert rex-socket back to 0.1.17 for now
...
This reverts a change that causes SSL certificate generation to not working properly through all of the various shim functions in rex-socket. This is the quickest fix which grants some time to ponder if the interface could be a little more robust in rex-socket in the first place.
2019-07-02 16:32:52 -05:00
William Vu
ef20123c34
Land #12044 , snmp_enum SNMP::NoSuchInstance fix
2019-07-02 16:26:33 -05:00
William Vu
64b385234f
Land #12036 , OpenVAS missing workspace import fix
2019-07-02 16:26:26 -05:00
Matthew Kienow
260c369aff
Fix network interface processing
...
The SNMP walk operation can return an SNMP::NoSuchInstance class.
The error class must be handled rather than attempting to use it as a
valid value.
2019-07-02 15:14:55 -04:00
Metasploit
eeca72d39b
automatic module_metadata_base.json update
2019-07-02 10:59:24 -07:00
William Vu
df85377ff3
Land #12042 , bypassuac_silentcleanup author fix
2019-07-02 12:43:14 -05:00
William Vu
5e04ab2e66
Add lokiuox to bypassuac_silentcleanup authors
...
Looks like they were removed by accident.
2019-07-02 12:36:07 -05:00
Brendan Coles
a0538a9613
Add Xymon useradm Command Execution module
2019-07-02 14:04:07 +00:00
Brendan Coles
14552a7332
Update documentation
2019-07-02 13:58:19 +00:00
Metasploit
295c484fe4
automatic module_metadata_base.json update
2019-07-01 14:39:07 -07:00
h00die
a42c7ea736
land #11990 windows tomcat cmdlinearguments
2019-07-01 17:29:02 -04:00
h00die
9ab7b7f5e6
add cmdlineargs example
2019-07-01 17:19:04 -04:00
Metasploit
eb643793a2
automatic module_metadata_base.json update
2019-07-01 14:16:38 -07:00
asoto-r7
d3056723e1
Land #12030 , CVE-2019-12181: Serv-U FTP Server prepareinstallation privesc
2019-07-01 16:01:04 -05:00
Matthew Kienow
4e11dcfee1
Fix import issue caused by missing wspace key
...
Modify import module to follow pattern used in other Msf::DBManager
import modules. Test module updated for method name changes.
2019-07-01 15:58:36 -04:00
Brendan Coles
9539408e33
Add support for retrieving xymonpasswd
2019-07-01 10:51:34 +00:00
O . S . O
51fe61838d
Create xor_context.rb
2019-07-01 10:36:08 +02:00
Brendan Coles
f630350b1f
Add documentation
2019-06-30 04:09:54 +00:00
Brendan Coles
1a7fb79cfc
Add config retrieval
2019-06-30 04:03:17 +00:00
bcoles
82b583b2b5
Use symbolic args
2019-06-30 12:31:29 +10:00
Brendan Coles
a4da66fabe
Add Xymon Daemon Gather Client Host Information module
2019-06-29 16:48:39 +00:00
Brendan Coles
b71fe69c16
Add shutdown method to Exploit::Remote::Tcp
2019-06-29 16:42:08 +00:00
Metasploit
d723122e0e
automatic module_metadata_base.json update
2019-06-29 03:52:23 -07:00
Brent Cook
e50ab5cd13
Land #11726 , add exploit for CVE-2019-8513, macOS TimeMachine cmd injection
2019-06-29 05:36:12 -05:00
Brent Cook
6fd18aaf8a
add High Sierra scenario
2019-06-29 05:35:29 -05:00
Brent Cook
45734408a6
remove reload_search since refresh_cache_from_module_files seems to not work as expected at runtime
2019-06-29 03:51:56 -05:00
Metasploit
78967c3e6d
automatic module_metadata_base.json update
2019-06-29 01:46:05 -07:00
Brent Cook
a186396836
unlink the user store if it exists
2019-06-29 03:45:53 -05:00
Brent Cook
4756a17dfa
remove update of the base module store
2019-06-29 03:37:54 -05:00
Brent Cook
42c0a3b96a
deprecate the db_rebuild_cache command, add reload_search
...
For a while, Metasploit has not used the old database-backed module cache in favor of the lightweight JSON data store. This also means that the db_rebuild_cache command has been broken.
While the base module cache usually stays up to date, if you delete a module as a developer, there's currently no great way to make the search function forget about that module unless you rebuild the cache manually (a procedure mostly documented inside of an automated build job).
This moves the logic from that build job into the a new reload_search command, and deprecates the old one.
2019-06-29 03:36:39 -05:00
Brent Cook
4e544fe733
Land #11968 , only enable UDP stagers for compatible payloads
2019-06-29 03:34:15 -05:00
Brent Cook
83e2c71b44
Land #11923 , Set sockaddr_len with x64 shell_find_port payload
2019-06-29 03:26:52 -05:00
Brent Cook
03d1c87eb6
Land #11976 , use special-case path for shell command with Android meterpreter
2019-06-29 03:23:27 -05:00
Brent Cook
06f6b0294c
Land #12023 , repeat search by default
2019-06-29 03:16:03 -05:00
bcoles
895a5b6aec
Add software link
2019-06-29 14:15:31 +10:00
bcoles
c7ff78c277
Remove spaces at EOL
2019-06-29 14:01:18 +10:00
Brendan Coles
203e3b74db
Add Serv-U FTP Server prepareinstallation Privilege Escalation
2019-06-29 03:52:53 +00:00
William Vu
663e61d636
Land #12029 , nil fix for core.private.jtr_format
2019-06-28 14:54:06 -05:00
Shelby Pace
6ebe192674
check core.private before accessing jtr_format
2019-06-28 14:17:52 -05:00
William Vu
b8165e825d
Make help syntax consistent
2019-06-28 14:01:28 -05:00
William Vu
b39ed5eb02
Add period
2019-06-28 13:59:52 -05:00
William Vu
3f187d4f0a
Update help
2019-06-28 13:58:14 -05:00
William Vu
3c09aa47d7
Once more, with feeling
2019-06-28 13:54:14 -05:00
William Vu
fd7f6b2d59
Refactor match/search_params placement
2019-06-28 13:44:24 -05:00
William Vu
353428d10c
Prefer cached results when given no arguments
2019-06-28 13:24:40 -05:00
asoto-r7
dd3db07b17
Correctly fixed json_to_mdm_object (thanks @mkienow-r7 for the catch)!
2019-06-28 12:53:04 -05:00
Metasploit
a0d10aad94
automatic module_metadata_base.json update
2019-06-28 10:40:38 -07:00
William Vu
0a00f3851a
Land #12007 , true 0s timeout in send_request_*
2019-06-28 12:32:32 -05:00
William Vu
4bf5e6c53f
Land #12014 , nil bug fix for HttpServer#get_uri
2019-06-28 12:32:19 -05:00
Metasploit
a3a77f8d4b
automatic module_metadata_base.json update
2019-06-28 10:20:01 -07:00
William Vu
49176a3606
Land #11952 , Supra Smart Cloud TV RFI module
2019-06-28 12:12:15 -05:00
William Vu
baa17290e4
Adjust name :)
2019-06-28 12:08:27 -05:00
Metasploit
354da811ec
automatic module_metadata_base.json update
2019-06-28 09:42:39 -07:00
asoto-r7
21dd1091fe
Land #12025 , Fix sshexec hanging on exec! and blocking close
2019-06-28 11:15:06 -05:00
asoto-r7
45c8c04834
Updated json_to_mdm_object() calls, removing third parameter
2019-06-28 10:18:00 -05:00
Dhiraj Mishra
09d6ae3458
Removing comments
...
Thanks wvu-r7 for your support.
2019-06-28 16:17:08 +05:30
Dhiraj Mishra
3279c66721
Adding documentation
2019-06-28 15:57:59 +05:30
William Vu
d7a5eae146
Fix bug, adjust prints, and check body for "OK"
2019-06-28 04:12:57 -05:00
Metasploit
c0f8e7cea6
automatic module_metadata_base.json update
2019-06-27 20:12:41 -07:00
William Vu
7a26e1c257
Fix sshexec hanging on exec! and blocking close
2019-06-27 22:07:37 -05:00
William Vu
51630839ba
Land #12022 , LoginScanner/PASSWORD_SPRAY fix
2019-06-27 21:56:28 -05:00
William Vu
744a1dca75
Add the ability to display previous search results
2019-06-27 21:27:20 -05:00
William Vu
dc81adb417
Add GatherProof advanced option to ssh_login*
2019-06-27 21:04:20 -05:00
William Vu
0a10d41250
Add skip_gather_proof to LoginScanner::SSH
2019-06-27 21:00:29 -05:00
James Barnett
2ed8e6db97
Deregister PASSWORD_SPRAY option for LoginScanner modules
2019-06-27 17:06:32 -05:00
asoto-r7
8d63d2bbf7
pingback: Removing seemingly unnecessary 'generate_raw' method
2019-06-27 16:02:00 -05:00
asoto-r7
229e46f8cb
cmd/unix/pingback_bind: Add resiliency to netcat, per wvu's suggestion
2019-06-27 15:48:22 -05:00
Metasploit
fcd77b1314
Bump version of framework to 5.0.35
2019-06-27 11:41:42 -07:00
Metasploit
58e36b6e51
Bump version of framework to 5.0.34
2019-06-27 10:04:44 -07:00
Metasploit
774eaa0029
automatic module_metadata_base.json update
2019-06-27 10:02:29 -07:00
William Vu
1503dcd168
Land #11997 , SilentCleanup UAC bypass
2019-06-27 11:52:56 -05:00
Metasploit
6c7e08c8fc
automatic module_metadata_base.json update
2019-06-27 09:45:39 -07:00
William Vu
6f1aaac70e
Add enigma0x3 and fix nyshone69 researchers
2019-06-27 11:38:34 -05:00
asoto-r7
26cd53efb6
Land #11977 , AWS EC2, S3, and IAM Enumeration
2019-06-27 11:29:05 -05:00
William Vu
7b0aac72ec
Fix missing is_in_admin_group? method
...
This was missed in the refactor, since admin_group was removed.
2019-06-27 11:16:49 -05:00
asoto-r7
7de8d76beb
Fixed merge conflict with Gemfile.lock
2019-06-27 11:15:55 -05:00
Metasploit
76f907c3a4
automatic module_metadata_base.json update
2019-06-26 23:56:48 -07:00
William Vu
56a620c64a
Land #12019 , typo fix for bypassuac_sluihijack
2019-06-27 01:47:25 -05:00
asoto-r7
ac835e139e
Pingback: Addressed some comments and suggestions
2019-06-26 16:55:45 -05:00
Jeff McJunkin
2927fd5dc8
Update bypassuac_sluihijack: Fix typo
2019-06-26 14:25:32 -07:00
asoto-r7
18f62926ce
Updated Gemfile.lock
2019-06-26 16:00:46 -05:00
asoto-r7
ec9bbfa5ae
Documentation for all three AWS enum_* modules
2019-06-26 14:59:22 -05:00
asoto-r7
0c83e55b00
enum_iam: Update 'Console Login' output to accurately reflect Disabled status
2019-06-26 14:57:32 -05:00
Shelby Pace
258f631f84
remove echo cmdstagerflavor
2019-06-26 13:56:13 -05:00
Shelby Pace
2f29c914ab
add changes, remove db backup delete code
2019-06-26 13:48:14 -05:00
Metasploit
e5868170fd
automatic module_metadata_base.json update
2019-06-26 10:35:25 -07:00
William Vu
61f09d0538
Land #12017 , xdebug_unauth_exec nil fix
2019-06-26 12:26:30 -05:00
Metasploit
11ef19d264
automatic module_metadata_base.json update
2019-06-26 09:23:41 -07:00
William Vu
a1a630b7af
Land #12018 , Pen Test Partners reference for RV130
2019-06-26 11:13:39 -05:00
William Vu
cc3fd747aa
Add Pen Test Partners reference
...
Did we somehow miss this?
2019-06-26 11:05:22 -05:00
Jacob Robles
efc61a4934
Use cmdstager
2019-06-26 10:15:25 -05:00
Jacob Robles
7c3e566a23
Update check
...
Handle nil error code and fix version extraction based
on both of the possible Apache Tika return pages.
2019-06-26 10:15:25 -05:00
Patrick Webster
8d6f36e05c
Minor fix for xdebug_unauth_exec
...
Avoid triggering error where res.headers may not exist.
2019-06-27 01:00:49 +10:00
William Vu
59d75a1658
Land #12015 , dcerpc_getarch documentation fix
2019-06-26 02:44:07 -05:00
William Vu
9fe138e3dc
Remove misleading comment from dcerpc_getarch
...
I transferred my implementation. I don't understand this comment.
2019-06-26 02:40:16 -05:00
William Vu
933b5f0413
Tidy up send_request_cgi
2019-06-26 00:59:53 -05:00
William Vu
00530031fd
Try not encoding the GET parameters
2019-06-26 00:55:23 -05:00
William Vu
f3b509a1bc
Implement on_request_uri
2019-06-25 23:47:19 -05:00
William Vu
fe11eabe62
Merge remote-tracking branch 'upstream/master' into pr/11952
2019-06-25 23:47:06 -05:00
William Vu
01b308fe7c
Fix get_resource nil bug in HttpServer#get_uri
2019-06-25 23:10:50 -05:00
asoto-r7
0c92c69e95
Initial enum_s3 documentation
2019-06-25 18:07:03 -05:00
Wei Chen
b59fd4331b
Update documentation
2019-06-25 17:14:10 -05:00
Wei Chen
2fb129ad41
Allow check in exploit to be optional
2019-06-25 17:13:55 -05:00
asoto-r7
84b6f05947
Fix 'bucket' typo
2019-06-25 16:35:44 -05:00
Metasploit
b672412aeb
automatic module_metadata_base.json update
2019-06-25 14:32:35 -07:00
Wei Chen
685fb55179
Land #11987 , Add Nagios XI 5.5.6 magpie_debug Root Exploit
2019-06-25 16:17:50 -05:00
Wei Chen
01c49f22fb
Change doc name
2019-06-25 16:16:32 -05:00
Wei Chen
23dbc4d90d
Change file name
2019-06-25 16:10:44 -05:00
Wei Chen
e9fc9970ba
Make names more random. Also, make metadata changes
2019-06-25 16:09:15 -05:00
asoto-r7
de97615e9d
Land #12013 , Make SRVHOST the callback address in confluence_widget_connector
2019-06-25 16:06:37 -05:00
Metasploit
29d9f3ea28
Bump version of framework to 5.0.33
2019-06-25 13:08:28 -07:00
Metasploit
07cb5c5e10
Bump version of framework to 5.0.32
2019-06-25 12:57:14 -07:00
Quentin Kaiser
94dd2b1800
Fix disclosure date format.
...
Co-Authored-By: @shellfail <jrobles@rapid7.com >
2019-06-25 20:50:56 +02:00
Quentin Kaiser
5ca4163765
Fix documentation markup and titles.
2019-06-25 20:50:09 +02:00
William Vu
5c14aea1a0
Fix target_platform check (it's empty, not nil)
2019-06-25 12:56:36 -05:00
William Vu
cf140f0840
Make SRVHOST the callback address
2019-06-25 12:43:04 -05:00
Shelby Pace
2af76c1997
add documentation and finished module
2019-06-25 11:21:15 -05:00
Metasploit
dae98d27d7
automatic module_metadata_base.json update
2019-06-24 23:05:38 -07:00
William Vu
77395749da
s/infinite/indefinite/
2019-06-25 01:00:08 -05:00
William Vu
44ad25ae34
Land #12008 , struts2_content_type_ognl 302 fix
2019-06-25 00:40:58 -05:00
Carter Brainerd
5e8b076714
Final review changes
2019-06-25 07:21:08 +02:00
James Lee
303bfaa7eb
Don't worry about response code
...
I found one that returned a 302
2019-06-24 13:53:31 -05:00
William Vu
7739e9f43e
Update my modules
2019-06-24 13:38:14 -05:00
Jacob Robles
8be8aa603c
Adjust logic
...
Early return to reduce nesting ifs
2019-06-24 12:43:26 -05:00
Jacob Robles
3d143f366c
Remove LIMIT and adjust quotes
2019-06-24 12:40:01 -05:00
William Vu
b49fa29a7f
Allow true zero-second timeout in send_request_*
...
Also fixes a bogus response when timeout is nil.
2019-06-24 12:07:24 -05:00
yaumn
9e056601eb
Exploits now also works with netcat
2019-06-24 08:11:13 +01:00
Metasploit
6a55227c56
automatic module_metadata_base.json update
2019-06-22 00:52:07 -07:00
William Vu
1f5137fcb6
Land #11996 , ZDI reference for rails_double_tap
2019-06-22 02:34:14 -05:00
Carter Brainerd
d2dc5f6077
Review changes
2019-06-22 00:18:44 -04:00
Shelby Pace
54aff89563
add requests to create, remove, clean db backups
2019-06-21 16:00:56 -05:00
yaumn
6b39bec4fc
Add netcat method (still buggy though)
2019-06-20 23:21:19 +01:00
Carter Brainerd
d90dba5d6e
Hopefully final msftidy fixes
2019-06-20 17:03:38 -04:00
Carter Brainerd
679f55d0c5
Docs cleanup
2019-06-20 17:02:02 -04:00
asoto-r7
fa5cdb6ff3
Remove unecessary gems (we might add them back later)
2019-06-20 15:09:25 -05:00
asoto-r7
358ff635dd
Renamed modules per @wvu's offline suggestion
2019-06-20 15:08:30 -05:00
Shelby Pace
e43fc2d921
added skeleton, check method
2019-06-20 14:05:41 -05:00
Carter Brainerd
96b499080c
Add docs
2019-06-20 15:01:53 -04:00
Carter Brainerd
1a877abe09
Msftidy was not happy
2019-06-20 14:50:56 -04:00
Carter Brainerd
534e2bc405
Make the darn thing work
2019-06-20 14:40:46 -04:00
Carter Brainerd
fded7fb922
Create bypassuac_silentcleanup.rb
2019-06-20 13:53:54 -04:00
Metasploit
8244457b33
Bump version of framework to 5.0.31
2019-06-20 10:05:48 -07:00
Guillaume Andre
c8786e181f
First version of the exploit is now working
...
Change-Id: Idf6b6d773cf71c477fe68885313f5f98d74d9c11
2019-06-20 16:53:43 +01:00
Wei Chen
8920152eca
Add a ZDI reference for CVE-2019-5420 Rails exploit
2019-06-20 10:43:21 -05:00
NickTyrer
5a010e1446
update documentation
2019-06-20 16:07:25 +01:00
Guillaume Andre
c1cf728507
First commit
...
Change-Id: If751eb1753fc8991fe7971c7123a203734396a46
2019-06-20 12:17:38 +01:00
Tim W
809a990ab8
add mouse doubleclick
2019-06-20 15:21:41 +08:00
Tim W
48d29e532e
add keyevent api
2019-06-20 13:54:13 +08:00
Shelby Pace
d818a27a7c
added check, path for diaghub exploit
2019-06-19 16:14:02 -05:00
Shelby Pace
d3cd1a3fa0
added VS2013 compiled executables
2019-06-19 15:19:00 -05:00
Metasploit
4fa6fb8db9
automatic module_metadata_base.json update
2019-06-19 12:52:21 -07:00
Jeffrey Martin
e1b982dfa9
Land #11993 , Explicitly require 'rc4' in the BlueKeep scanner.
2019-06-19 14:42:01 -05:00
Jeffrey Martin
e98e69fb80
add automation tests for bluekeep server targets
2019-06-19 13:54:14 -05:00
Metasploit
fba601b584
automatic module_metadata_base.json update
2019-06-19 09:07:26 -07:00
Wei Chen
a93a520c3a
Land #11960 , Add LPE for Cisco Prime Infrastructure's runrshell exe
2019-06-19 10:49:17 -05:00
Wei Chen
c637755ebd
Land #11956 - Add Cisco Prime Infrastructure Health Monitor Tar RCE
2019-06-19 10:46:35 -05:00
Metasploit
a61401b1f8
automatic module_metadata_base.json update
2019-06-19 06:57:30 -07:00
Shelby Pace
4d7d807025
Land #11983 , add Webmin package update rce
2019-06-19 08:35:01 -05:00
Shelby Pace
ddf7eadeee
modified version check
2019-06-19 08:31:48 -05:00
Pearce Barry
3f0810502e
Explicitly require 'rc4' in the BlueKeep scanner.
...
Appears to still operate as-expected:
msf5 > use auxiliary/scanner/rdp/cve_2019_0708_bluekeep
msf5 auxiliary(scanner/rdp/cve_2019_0708_bluekeep) > set rhosts <target>
rhosts => <target>
msf5 auxiliary(scanner/rdp/cve_2019_0708_bluekeep) > run
[+] <target>:3389 - The target is vulnerable.
[*] <target>:3389 - Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
Fixes MS-4291.
2019-06-19 08:27:04 -05:00
Wei Chen
0cec80ba24
update doc
2019-06-18 21:34:16 -05:00
Jacob Robles
efeb0a5f5c
Land #11971 , zip extraction from modbus pcap
2019-06-18 16:25:27 -05:00
Wei Chen
384cfc7db5
update checkcode
2019-06-18 15:58:57 -05:00
Wei Chen
16cfd3f4ac
Fix typos
2019-06-18 15:49:40 -05:00
Wei Chen
4a32164370
Add doc for CVE-2019-0232
2019-06-18 15:28:42 -05:00
Wei Chen
585a4340b2
Add exploit for CVE-2019-0232: Apache Tomcat CGIServlet RCE
2019-06-18 15:28:11 -05:00
Jacob Robles
2873284323
Doc updates
2019-06-18 14:28:43 -05:00
Jacob Robles
4d1bd60853
Update documentation
2019-06-18 14:16:34 -05:00
Jacob Robles
66c3c6a94b
Remove unused mixin, update save loot logic
...
Capture mixin was not used. Loot was being
saved when a zip file wasn't found. Updated
file path so the module is under analyze.
2019-06-18 14:08:47 -05:00
Özkan Mustafa Akkuş
992a638a79
Merge pull request #1 from space-r7/pr11983
...
Add minor module changes
2019-06-18 09:58:20 +03:00
Chris Higgins
ceba93e84e
Land #11904 , fix meterpreter screenshot dll upload
2019-06-17 23:36:29 -05:00
asoto-r7
36eeba4e37
Address code review from @jrobles-r7. Thanks!
2019-06-17 16:19:45 -05:00
yaumn
8723775564
Add a module documentation file
2019-06-17 21:50:03 +01:00
Shelby Pace
d4d2eab770
removed some whitespace, added a check
2019-06-17 15:29:08 -05:00
asoto-r7
850951e261
Fix a bug in MFA output, and also try to fix Travis complaintsy
2019-06-17 15:01:51 -05:00
Özkan Mustafa Akkuş
a5020b8f30
Fix spaces at EOL
2019-06-17 13:16:56 +03:00
Özkan Mustafa Akkuş
b5e34cb783
Converting version check request to vars_get
...
We also need to add the "testing = 1" cookie to the login request. Otherwise, the browser displays a No-Cookie error.
2019-06-17 10:46:46 +03:00
yaumn
e13456ce0d
Add root to the filename
2019-06-16 23:32:57 +01:00
siberguvenlik
17f686a87d
Adding module documentation
2019-06-16 18:27:01 -04:00
yaumn
8faa138289
Change targets and default http delay
2019-06-16 23:13:45 +01:00
siberguvenlik
3d463a1e20
Adding correction of Check and Payload definitions
2019-06-16 17:58:31 -04:00
yaumn
863beaea92
First commit for module Nagios XI RCE
2019-06-16 22:10:32 +01:00
siberguvenlik
414c614b55
CVE-2019-12840 - Add Webmin 1.910 RCE Module
2019-06-16 11:26:00 -04:00
NickTyrer
791da38fe4
update instructions
2019-06-16 11:39:03 +01:00
NickTyrer
b7137ea426
update module flow
2019-06-15 20:03:17 +01:00
NickTyrer
46ebae8231
implemented rubocop suggestions
2019-06-15 11:06:38 +01:00
Metasploit
eb8e0e238d
automatic module_metadata_base.json update
2019-06-14 19:47:04 -07:00
William Vu
379caff828
Land #11932 , TLS and doc'd packets for BlueKeep
2019-06-14 21:10:08 -05:00
William Vu
3d8b474632
Clean up module
2019-06-14 21:09:57 -05:00
William Vu
282e2b3d78
Land #11979 , missing bind_tcp_rc4 tests
2019-06-14 20:57:56 -05:00
Jeffrey Martin
b6aa04bbe4
add missing bind_tcp_rc4 payload tests
2019-06-14 16:18:31 -05:00
bwatters-r7
b67b48fd50
Land #11966 , Stop error rendering in multi/meterpreter handler
...
Merge branch 'land-11966' into upstream-master
2019-06-14 14:01:58 -05:00
jdiog0
6646295d51
modbus zip
...
Co-Authored-By: @shellfail <jrobles@rapid7.com >
2019-06-14 19:27:54 +01:00
asoto-r7
e2d4dc5f41
Initial concept for AWS IAM enumeration
2019-06-14 13:23:20 -05:00
asoto-r7
1d800a5d9a
Move error handling method up, in preparation for making a library, maybe
2019-06-13 18:40:34 -05:00
asoto-r7
54a17e0a51
Initial concept for AWS S3 enumeration
2019-06-13 18:40:16 -05:00
Tim W
3338401708
fix #11975 , fix meterpreter shell command on android
2019-06-14 06:01:53 +08:00
Adam Cammack
1f6d61dde8
Land #11965 , Add secure Meterpreter command
...
The command will force or renegotiate TLV encryption on the for the
current session.
2019-06-13 14:20:50 -05:00
Metasploit
a2b29de2f7
automatic module_metadata_base.json update
2019-06-13 12:12:49 -07:00
bwatters-r7
b9cefe1b79
Land #11958 , abrt_raceabrt_priv_esc: Fix abrt package version check
...
Merge branch 'land-11958' into upstream-master
2019-06-13 14:02:15 -05:00
Metasploit
1789ca21eb
automatic module_metadata_base.json update
2019-06-13 10:30:03 -07:00
bwatters-r7
aed504c0a9
Land #11944 , Implement bind TCP with RC4 decryption for x64
...
Merge branch 'land-11944' into upstream-master
2019-06-13 12:09:31 -05:00
Metasploit
644a70ff15
Bump version of framework to 5.0.30
2019-06-13 10:07:30 -07:00
William Vu
dfd74107c0
Land #11974 , full path in pgrep -lf output
2019-06-13 10:48:47 -05:00
William Vu
bcee6f0dc2
Join full path nicely
2019-06-13 10:30:36 -05:00
bwatters-r7
805d64428f
Stupid pry...
2019-06-13 10:27:29 -05:00
bwatters-r7
a11d6221d9
Update the session to die after callback
...
Remove stale old file
2019-06-13 09:08:14 -05:00
William Vu
8e6fbcb4b5
Concatenate path and name in Meterpreter pgrep -lf
2019-06-12 19:13:02 -05:00
Brent Cook
f11a205b41
remove patchupdllinject
2019-06-12 17:39:56 -05:00
William Vu
2d14966b0b
Land #11963 , kill command help correction
2019-06-12 11:00:38 -05:00
Tom Sellers
a2863ff3cf
Add comment to pdu_connect_initial
2019-06-12 10:46:12 -05:00
Tom Sellers
008f9061f6
Randomize client random, sanity check fields
2019-06-12 07:49:45 -05:00
asoto-r7
f96de95acc
Initial concept for AWS EC2 enumeration
2019-06-11 19:10:59 -05:00
Brent Cook
c13cf63f2d
remove dllinject
2019-06-11 17:58:57 -05:00
Tom Sellers
f4aa86c9b3
rubocop cleanup
2019-06-11 13:29:05 -05:00
asoto-r7
6f65f38943
Revert f162822
2019-06-11 13:23:58 -05:00
Metasploit
b1793f2d50
automatic module_metadata_base.json update
2019-06-11 11:14:07 -07:00
Tom Sellers
cc93b312ac
Add ability to configure username, client, IP, etc
2019-06-11 13:07:59 -05:00
Brent Cook
fa09b239e8
Land #11941 , add support for module aliases
2019-06-11 12:57:01 -05:00
Brent Cook
20d21bb7cc
update specs, add a few more compat modules
2019-06-11 12:56:11 -05:00
Metasploit
c79d86e562
automatic module_metadata_base.json update
2019-06-11 07:49:47 -07:00
Matthew Kienow
c80f6f9141
Land #11970 , Correct Websphere module CVE ref
2019-06-11 10:30:10 -04:00
Matthew Kienow
d91459f2eb
Correct module CVE reference
2019-06-11 09:14:40 -04:00
Brent Cook
4d6e0e9892
https
2019-06-11 04:48:52 -05:00
Brent Cook
44dfc3506d
add udpsockedi, tag compatible payloads
...
Not all payloads compatible with TCP stagers are compatible with UDP
stagers, so assuming sockedi is not sufficient to ensure compatibility.
This adds a udpsockedi which pairs compatible payloads together.
2019-06-11 04:19:14 -05:00
OJ
5621d200cc
Stop error rendering in multi/meterpreter
...
The reverse_http/s listeners result in awful errors when
multi/meterpreter is set as the payload. Anyone that hits the endpoint
with an invalid or missing UUID will spam the MSF console with
exceptions.
This patch avoids this issue in cases where the UUID isn't specific. We
avoid setting it as a default, which doesn't make sense anyway.
2019-06-11 13:39:52 +10:00
OJ
0e0edeb372
Add a secure command to renegotiate TLV encryption
...
This gives us the ability to force TLV encryption if for some reason
it's not already in place, and it means we can renegotiate a new key on
the fly if we want to.
2019-06-11 08:26:33 +10:00
William Vu
36cc535c8a
Remove jobs options from kill help
...
They do not apply.
2019-06-10 16:29:14 -05:00
bwatters-r7
915149ad6d
Reset send_uuid because it should not have been changed
...
remove debug print from options
change puts on pingback
2019-06-10 15:03:49 -05:00
Wei Chen
5c97c2fa19
Land #11951 , Add meterpreter > screenshare command
2019-06-10 13:25:27 -05:00
Wei Chen
d74881a3c0
Update based on bcole's feedback
2019-06-10 12:12:49 -05:00
Wei Chen
caa9987a77
Register payload for cleanup
2019-06-10 11:20:25 -05:00
Wei Chen
d63484562c
Correct disclosure date
2019-06-10 11:14:41 -05:00
Wei Chen
12cfada465
Add Cisco Prime Infrastructure runrshell Privilege Escalation
2019-06-10 10:29:43 -05:00
Brendan Coles
8cac968acb
Fix abrt package version check
2019-06-10 02:21:10 +00:00
h00die
bd58fdf77a
remove ssh.rb from change
2019-06-09 15:11:07 -04:00
h00die
4d60f38177
brocade working
2019-06-09 15:10:05 -04:00
h00die
cf90f8250d
reimport brocade module
2019-06-09 15:09:06 -04:00
Metasploit
361f9602a8
automatic module_metadata_base.json update
2019-06-08 11:50:58 -07:00
William Vu
6f16a44c8d
Land #11957 , CVE references for TrueOnline modules
2019-06-08 13:32:38 -05:00
Pedro Ribeiro
6693e3e347
add cve to trueonline v2
2019-06-08 17:41:04 +07:00
Pedro Ribeiro
903ea5ebce
add cve to p660hn v1
2019-06-08 17:38:44 +07:00
Pedro Ribeiro
c763f84348
add cve to billion module
2019-06-08 17:37:05 +07:00
Pedro Ribeiro
08258dd7ce
Merge pull request #8 from rapid7/master
...
hhhh
2019-06-08 17:35:36 +07:00
Wei Chen
4d6d06c9f9
Update disclosure date
2019-06-07 15:59:59 -05:00
Brent Cook
83528b8bb1
Land #11798 , Add Extended Passive Mode for FTP client
...
Merge remote-tracking branch 'upstream/pr/11798' into upstream-master
2019-06-07 15:09:23 -05:00
Metasploit
3a77e3454e
automatic module_metadata_base.json update
2019-06-07 13:05:35 -07:00
Wei Chen
2053513dc5
Minotr update for cpi_tararchive_upload
2019-06-07 13:12:14 -05:00
Wei Chen
1968e0d009
Add module doc for Cisco TarArchive exploit
2019-06-07 13:09:28 -05:00
William Vu
a8867992ae
Add minimal HttpServer support
2019-06-07 11:53:47 -05:00
William Vu
d943b4d314
Fix style
2019-06-07 11:44:17 -05:00
William Vu
be6a34398a
Rename module to match product
2019-06-07 11:33:10 -05:00
William Vu
9e47e061f2
Remove rank to appease msftidy
2019-06-07 11:28:39 -05:00
Brent Cook
3f5f48a3fc
Land #11340 , make SSH agent and other options configurable
2019-06-07 11:22:31 -05:00
William Vu
397e6b16a4
Move aux module out of exploits
2019-06-07 11:18:33 -05:00
Metasploit
da6a225ef8
Bump version of framework to 5.0.29
2019-06-07 09:03:32 -07:00
NickTyrer
45db30bd90
increase randomness to avoid duplicates
2019-06-07 15:02:47 +01:00
Brent Cook
5aed1f7dfe
Land #11914 , Fix external file import via web service
2019-06-07 06:03:42 -05:00
Wei Chen
69492d2a25
Add Cisco Prime Infrastructure Health Monitor TarArchive Exploit
2019-06-07 03:08:57 -05:00
William Vu
a1038bf9a8
Land #11954 , Retina XML importer fixes and updates
2019-06-07 00:40:28 -05:00
William Vu
dd101a0469
Add nil check
...
Just in case.
2019-06-07 00:16:44 -05:00
William Vu
53ea7e577f
Add sanitized new XML format
2019-06-07 00:07:50 -05:00
William Vu
10dccfcedb
Remove warning
...
<context> provides service info now:
<context>TCP:443 ([redacted]), SHA256[=][redacted], Serial[=][redacted]</context>
2019-06-06 23:45:07 -05:00
William Vu
40eeae541b
Fix style
2019-06-06 23:38:41 -05:00
Jeffrey Martin
f646a973a7
Update retina imports to better handle parsing
2019-06-06 19:13:06 -05:00
Shelby Pace
5b188a02ba
add code that makes hard links
2019-06-06 15:59:53 -05:00
Shelby Pace
76ef689827
add hard link creation code
2019-06-06 15:58:44 -05:00
James Barnett
37414b5760
Land #11948 , surface errors returned from remote data service in console
2019-06-06 12:40:42 -05:00
William Vu
b020e3232b
Move warning suppression
2019-06-06 12:33:54 -05:00
Metasploit
614c1afc41
Bump version of framework to 5.0.28
2019-06-06 10:07:53 -07:00
William Vu
19bd0f2183
Add comments
2019-06-06 10:50:26 -05:00
Dhiraj Mishra
6333271320
supra_smart_tv_rfi
2019-06-06 16:17:28 +05:30
Tim W
49ce878497
refactor html code into separate module
2019-06-06 13:39:53 +08:00
Metasploit
e76fd32bc1
automatic module_metadata_base.json update
2019-06-05 13:30:30 -07:00
Jacob Robles
af1afca1e3
Land #11940 , Add files to test that may not be open
2019-06-05 15:03:33 -05:00
Adam Cammack
0516441549
Land #11949 , Fix wordpress_content_injection CVE
2019-06-05 14:54:01 -05:00
Matthew Kienow
3c4699c848
Remove unnecessary leading slash from log message
2019-06-05 15:10:00 -04:00
Matthew Kienow
25f45144e8
Handle exceptions raised by get_msf_version call
...
Exceptions may be raised via the remote data service response handling
while making the call to check the MSF version.
2019-06-05 15:09:33 -04:00
Jacob Robles
bf6a62fba8
Add workspace arg to spec
2019-06-05 08:47:13 -05:00
Clément Notin
69ab2154ad
wordpress_content_injection: fix CVE number
2019-06-05 12:43:16 +02:00
asoto-r7
6d155a8573
Remove a left-over 'pry' debugger invocation
2019-06-04 17:52:03 -05:00
bwatters-r7
e8487b547f
Should not have changed reverse_tcp.rb
2019-06-04 16:01:45 -05:00
asoto-r7
928e4679ae
cmd/unix/pingback_* payloads now use 'printf' in place of 'echo'
2019-06-04 15:47:21 -05:00
asoto-r7
e9ef0b1c38
Remove workspace reference in async_callback database table
2019-06-04 15:12:31 -05:00
Metasploit
8c3d7b3900
automatic module_metadata_base.json update
2019-06-04 10:58:45 -07:00
Jacob Robles
9edf92434c
Land #11895 , CVE-2018-20434 LibreNMS cmd injection exploit
2019-06-04 12:28:24 -05:00
Metasploit
7366994f7b
automatic module_metadata_base.json update
2019-06-04 10:26:24 -07:00
Jacob Robles
c93c65cef5
Update date format
2019-06-04 12:24:00 -05:00
Matthew Kienow
749501d449
Refactor remote data service response handling
...
Raises exceptions for error responses rather than failing silently.
This exposes the server-side error message to the user in console.
2019-06-04 12:09:06 -05:00
Matthew Kienow
8fe11744bd
Use the revised ResponseWrapper error classes
2019-06-04 11:59:00 -05:00
Matthew Kienow
52c67a6952
Modify ResponseWrapper to support three states
...
There is a success response, an error response and a failed response.
An error response contains a body with an error message from the
server-side, while a failed response represents an invalid response
caused by an issue with the request or response.
2019-06-04 11:56:12 -05:00
Jacob Robles
c1572c89a8
Land #11841 , IBM WAS Network Deployment RCE CVE-2019-4279
2019-06-04 11:49:05 -05:00
Jacob Robles
129bb898d8
Merge CMD Target Update
2019-06-04 11:47:28 -05:00
bwatters-r7
eff819b523
Land #11945 , Make auto_cl more selective based on HTTP method
...
Merge branch 'land-11945' into upstream-master
2019-06-04 09:04:13 -05:00
Tom Sellers
e15840f8db
Add nil check for quick response
2019-06-04 08:36:58 -05:00
bwatters-r7
c28b15e9fe
Land #11823 , Handle invalid payloads more clearly
...
Merge branch 'land-11823' into upstream-master
2019-06-04 08:34:41 -05:00
Jacob Robles
8687a21f2d
Fix workspace calls
2019-06-04 08:33:58 -05:00
bwatters-r7
cd182e2014
Land #11938 , fix cmd_exec tests on python/windows
...
Merge branch 'land-11938' into upstream-master
2019-06-04 08:01:49 -05:00
bwatters-r7
bee013a18c
update cache size and fix an assignment
2019-06-04 07:13:34 -05:00
Tom Sellers
6a8e4366ae
Improve XP stabilty, trim dead code
2019-06-04 06:53:36 -05:00
Tom Sellers
9d17832347
Deal with virtual channel data blob
2019-06-04 05:49:45 -05:00
Brent Cook
e5a4c2d341
Make auto_cl more selective based on HTTP method
...
According to https://tools.ietf.org/html/rfc7230#section-3.3.2 , a zero content-length is valid for some kinds of HTTP methods.
Instead of implicitly disabling auto_cl if there is no actual content, disable auto_cl default for HTTP methods where semantics of the message do not anticipate any content. This can still be overridden by a caller if it still wants to add an empty content-length for HTTP methods where it does not normally make sense (e.g. if it exploits a bug.)
2019-06-04 04:04:08 -05:00
Metasploit
d50cf542cf
automatic module_metadata_base.json update
2019-06-03 23:13:42 -07:00
Wei Chen
b8abb550e6
Land #11924 , Update adobe_flash_opaque_background_uaf for Win 10
2019-06-04 00:51:34 -05:00
Wei Chen
191d73f3ef
Update rex-exploitation
2019-06-04 00:40:01 -05:00
Metasploit
30a0f25eae
automatic module_metadata_base.json update
2019-06-03 17:13:46 -07:00
Wei Chen
17170e2152
Land #11937 , make content-length header optional
2019-06-03 18:56:27 -05:00
RageLtMan
ff1630ad14
Implement bind TCP with RC4 decryption for x64
...
Update metasm generated shellcode blocks to cobble together an
RC4 decryption routine with a bind-socket handler for x64 targets.
Expose via new payload module
2019-06-03 18:06:53 -04:00
bwatters-r7
6f711dfab4
Land #11918 , replace trivial usage of expand_path with getenv
...
Merge branch 'land-11918' into upstream-master
2019-06-03 16:59:39 -05:00
Tom Sellers
b176948c3c
Refactor more binary blobs
2019-06-03 16:54:33 -05:00
Adam Cammack
deb31d77c3
Use the aliased name on instantiated modules
...
This creates a way for modules and the framework to see what name the
user entered to interact with a module.
2019-06-03 13:55:02 -05:00
Adam Cammack
2e36d90291
Add some less-verbose aliases
...
These aliases avoid duplicating the protocol in the module name.
2019-06-03 13:42:55 -05:00
Adam Cammack
cf59022936
Add aliases to modules
...
This allows modules that can be addressed by name to register possible
aliases for themselves by defining an `Aliases` constant in the top
level of the module.
2019-06-03 13:40:27 -05:00
Adam Cammack
c0d365aa46
Unify modules and cache with fullname method
2019-06-03 13:19:29 -05:00
Tom Sellers
61b5072e88
Add explicit check for NLA
2019-06-03 09:38:12 -05:00
Jacob Robles
d466ac990d
Use process_opts_workspace
2019-06-03 09:25:31 -05:00
Tom Sellers
5871dc0802
Fix nego when RDP Security is forced
2019-06-03 08:50:30 -05:00
bwatters-r7
e425547398
Add some files to the test that are not likely to be open
2019-06-03 08:25:46 -05:00
William Vu
e11cc621ea
Add ensures
2019-06-03 03:51:08 -05:00
suzu991154
cdce03f42d
fix_os_check
2019-06-03 16:17:23 +09:00
sinn3r
22e8d3488d
Land #11862 , wordlists for wordpress plugin/theme directories
...
Add wordlists for enumerating WordPress plugin/theme directories
2019-06-03 00:54:43 -05:00
William Vu
7c83734592
Update LoginScanner::SSH modules
2019-06-02 20:08:27 -05:00
William Vu
ad2ece1489
Actually set the client identification string
2019-06-02 20:01:04 -05:00
William Vu
2318100a12
Rename SSHVersion to SSH_IDENT for now
...
1. Not to be confused with protocol version
2. We'll want to CamelCase the advanced options
2019-06-02 18:26:25 -05:00
William Vu
586fe73699
Add Msf::Exploit::Remote::SSH::Options
2019-06-02 18:21:58 -05:00
William Vu
f70eac785d
Update comment
2019-06-02 17:04:31 -05:00
William Vu
3107339c6b
Add prints
2019-06-02 17:02:07 -05:00
William Vu
776061cc28
Fix style again
2019-06-02 16:55:48 -05:00
William Vu
75f1f0e331
Revert method name
2019-06-02 16:54:03 -05:00
William Vu
44ac458407
Simplify error check
2019-06-02 16:53:02 -05:00
William Vu
1fc49b2e12
Fix style
2019-06-02 16:50:44 -05:00
William Vu
eaa718f33a
Add functionality to change Net::SSH ident string
2019-06-02 16:46:43 -05:00
Tim W
cd460aa2cb
fix cmd_exec tests on python/windows
2019-06-03 03:47:52 +08:00
Brent Cook
76aeeafe7b
Land #11936 , rename a few module docs
2019-06-02 13:54:03 -05:00
Brent Cook
ba947eab20
another rename
2019-06-02 13:53:44 -05:00
Brent Cook
3cf375c05c
if there is no content, don't include content length
2019-06-02 13:27:11 -05:00
Chris Higgins
6ffc6b9b18
Fix #11934 , frontpage_credential_dump.md file move
2019-06-02 12:40:18 -05:00
Metasploit
f70a56edcf
automatic module_metadata_base.json update
2019-06-02 09:56:15 -07:00
Tim W
b5bdc06c4c
Land #11933 , add default VID and cmd/unix support to post/multi/manage/play_youtube
2019-06-03 00:39:11 +08:00
William Vu
42082f0bcf
Add unix platform
2019-06-02 11:31:43 -05:00
William Vu
fe5bc8242f
Add cmd/unix support
2019-06-02 11:19:44 -05:00
William Vu
852cd6c6c6
Note unused variables
2019-06-02 11:19:30 -05:00
William Vu
290741719c
Add default VID to post/multi/manage/play_youtube
2019-06-02 11:01:57 -05:00
Brent Cook
d3354152ab
Land #11913 , remove older Ruby's from test matrix
2019-06-02 10:48:27 -05:00
Tom Sellers
23139c5000
Bluekeep: add TLS, refactor
2019-06-02 10:02:09 -05:00
CCob
aaa017e9cd
Fix issue where Linux x64 shell_find_port did not set the sockaddr_len value
2019-06-02 09:23:09 +01:00
Metasploit
3ddd68394b
automatic module_metadata_base.json update
2019-06-01 19:46:11 -07:00
Brent Cook
817d3ce081
Land #11477 , add Exploit for CVE-2018-4233 and async_wait for iOS 10 to 11.2
2019-06-01 21:24:44 -05:00
Tim W
18c825d7fa
update mettle payloads gem to include dylib
2019-06-02 10:22:30 +08:00
Tim W
6921ca74d8
add exploit binary
2019-06-02 10:19:24 +08:00
Tim W
d0cce0a6a4
offsets for iPhone 5S 10.2.1
2019-06-02 10:19:24 +08:00
Tim W
d2c43ea30b
add documentation
2019-06-02 10:19:24 +08:00
Tim W
5b708532b4
use MetasploitPayloads to_binary
2019-06-02 10:19:24 +08:00
Tim W
c659a1e5b4
add description
2019-06-02 10:19:24 +08:00
Tim W
448782a927
fix build when missing IOKit headers
2019-06-02 10:19:24 +08:00
Tim W
aabe316662
fixes for iOS 10
2019-06-02 10:19:24 +08:00
Tim W
2b54d411f6
fix iOS 11 offset cache
2019-06-02 10:19:24 +08:00
Tim W
e6a8d66460
fix iOS 10 again
2019-06-02 10:19:24 +08:00
Tim W
b7574f2dd8
cleanup
2019-06-02 10:19:24 +08:00
Tim W
90da47627b
fix file-map-executable
2019-06-02 10:19:24 +08:00
Tim W
d2eec0fef2
trustcache
2019-06-02 10:19:24 +08:00
Tim W
7156b1b31f
uid0
2019-06-02 10:19:24 +08:00
Tim W
70aa762958
tfp0 via async_wake
2019-06-02 10:19:24 +08:00
Tim W
6d9385cb8a
ios 11 faf
2019-06-02 10:19:24 +08:00
Tim W
b142115c82
fix iOS 11.0.2
2019-06-02 10:19:24 +08:00
Tim W
6f6cf443b6
begin iOS 11
2019-06-02 10:19:24 +08:00
Tim W
33a4866c36
add offset cache
2019-06-02 10:19:24 +08:00
Tim W
dd8b3d2b94
fix 10_3_2
2019-06-02 10:19:24 +08:00
Tim W
f15e70ea03
various fixes
2019-06-02 10:19:24 +08:00
Tim W
f7ee0234b6
fix liboffsetfinder64
2019-06-02 10:19:24 +08:00
Tim W
f1392e1828
compile liboffsetfinder64
2019-06-02 10:19:24 +08:00
Tim W
9d0ab73b33
fix build
2019-06-02 10:19:24 +08:00
Tim W
3d414dac74
add hash to trust cache
2019-06-02 10:19:24 +08:00
Tim W
32af9cb897
Initial commit of CVE-2018-4233 for iOS 10
2019-06-02 10:19:24 +08:00
Metasploit
28d671ca03
automatic module_metadata_base.json update
2019-06-01 10:33:05 -07:00
Brent Cook
1de4a83d13
Land #11902 , add missing cmd/unix/reverse_bash_udp test
2019-06-01 12:09:56 -05:00
Brent Cook
4286068154
Land #11906 , fix osx 10.7 hash IDing and JTR IDs
2019-06-01 12:05:35 -05:00
Tim W
103afc6568
fix screenshare
2019-06-02 00:16:13 +08:00
suzu991154
0a6f1d5538
Add support for Windows 10(10240) to CVE-2015-5122
2019-06-01 14:44:30 +09:00
bwatters-r7
1ed6187212
Undo changes to windows/bind_tcp
2019-05-31 18:47:54 -05:00
Brent Cook
53557cc92e
replace trivial usage of expand_path with getenv
...
expand_path is not implemented consistently across platforms and
sessions, which leads to confusing behavior. In places where we have trivial
single variable expansions, this changes modules and library code to just use
getenv.
We'll look at the rest individually to see if they can also be reimplemented in
terms of getenv.
2019-05-31 17:44:35 -05:00
Brent Cook
3cff008d73
Land #11915 , raise exceptions directly
2019-05-31 15:18:02 -05:00
Brent Cook
621d404a27
fix tests, handle stdin properly
2019-05-31 15:02:59 -05:00
Jacob Robles
7c29c56880
Bubble error
...
Raise Validation error that is checked for
2019-05-31 14:57:33 -05:00
William Vu
cb39f72808
Land #11911 , Java payload fixes
2019-05-31 14:56:41 -05:00
Brent Cook
d988fe6e5c
handle invalid payloads more clearly
...
Currently, if you have an error in a payload module (e.g. you have a syntax
error in a module), the error is not noticed early enough in the generation process by the parameter validator, leading to a mysterious message like so:
```
Error: undefined method `platform' for nil:NilClass
```
This change cleans up some of the error handling, checks to see if the payload
module can be instantiated, and gives a more useful error output for the
different cases. This also tweaks some of the literal string outputs to match
other exception strings from payload_generator.
2019-05-31 14:32:49 -05:00
Brent Cook
93d1b955c5
also kill 2.4.x
2019-05-31 14:09:36 -05:00
Chris Higgins
01de6954fe
Land #11912 , Bigdecimal boot
2019-05-31 14:04:20 -05:00
Jeffrey Martin
bd67ecd0dc
add missing cmd/unix/reverse_bash_udp test
2019-05-31 13:53:12 -05:00
Jacob Robles
e9d0dc7518
Workspace arg used in call to func
2019-05-31 13:17:59 -05:00
Jacob Robles
37b0809e05
Remove workspace call
...
The #workspace call wasn't running as expected when using
the data service. It was ending up in infinite recursion.
2019-05-31 13:08:27 -05:00
Brent Cook
068f8f98f7
remove Ruby 2.3.8 from Metasploit test matrix
...
Ruby 2.3.8 is no longer supported:
https://www.ruby-lang.org/en/news/2018/10/17/ruby-2-3-8-released/
2019-05-31 12:57:38 -05:00
Brent Cook
73c8e803fe
Land #11892 , Fix parse IPv6 address in reverse_http
2019-05-31 12:41:36 -05:00
Brent Cook
d9d0639a91
move BigDecimal patch earlier in boot process
...
This makes msfvenom also quiet about the impending deprecation.
2019-05-31 12:31:35 -05:00
Brent Cook
526df180b1
fix java/android cmd_exec and shell_command_token
...
This change fixes a race condition in the cmd_exec tests and rapid7/metasploit-framework#11530
From https://github.com/rapid7/metasploit-payloads/pull/334
2019-05-31 11:11:01 -05:00
Metasploit
8295aebf3a
automatic module_metadata_base.json update
2019-05-31 07:54:05 -07:00
Brent Cook
23e59c9e66
Land #11838 , add keyboard and mouse input controls on Windows/MacOS
2019-05-31 09:35:01 -05:00
Brent Cook
b9af69a5be
update payloads
2019-05-31 09:32:44 -05:00
Brent Cook
edefc52bbd
Merge branch 'master' into land-11838-
2019-05-31 09:29:25 -05:00
Jeffrey Martin
b14a40f564
Land #11887 , Fix multi meterpreter_reverse_http handler to not care so much about the workspace.
2019-05-30 18:32:57 -05:00
h00die
06256cc05b
fix osx 10.7 hash IDing, and JTR ids
2019-05-30 18:33:45 -04:00
bwatters-r7
d5198069ff
Stupid last trailing space
2019-05-30 16:45:08 -05:00
Jake Blank
933cf25efb
add live remote screensharing/monitoring
2019-05-31 05:26:38 +08:00
bwatters-r7
b7da6c4492
Fix some spacing
2019-05-30 16:09:33 -05:00
bwatters-r7
11be752a2f
Reset changes to Gemfile.lock
2019-05-30 14:30:12 -05:00
bwatters-r7
2f92d0f8a2
Shut up, nmsftidy.... I hope
2019-05-30 14:27:37 -05:00
bwatters-r7
139ea45dae
Hold off on venom changes for a new PR
2019-05-30 14:19:17 -05:00
Shelby Pace
c2786eb87c
made suggested changes
2019-05-30 14:09:40 -05:00
Jacob Robles
1069c3de4f
File cleanup
2019-05-30 13:36:28 -05:00
Metasploit
026b38eb71
Bump version of framework to 5.0.27
2019-05-30 10:06:32 -07:00
bwatters-r7
e3c85425ee
Add the new file
2019-05-30 11:41:04 -05:00
bwatters-r7
b81001d486
Code deduplication
2019-05-30 11:40:57 -05:00
asoto-r7
22ad4dbf95
WIP: Adding default pingback payload to parent check method
2019-05-30 11:40:57 -05:00
asoto-r7
45197cf4ab
Clean up requires and includes
2019-05-30 11:40:57 -05:00
asoto-r7
f118af18ea
Clean up require's and calculate CachedSize
2019-05-30 11:40:57 -05:00
asoto-r7
f3cf6e8159
cmd/unix/pingback_reverse and cmd/unix/pingback_bind
2019-05-30 11:40:56 -05:00
bwatters-r7
2469d9e010
That's better.....
2019-05-30 11:40:56 -05:00
bwatters-r7
f8492c8b0b
First swing at x86 windows reverse_tcp pingback
...
Still issues with the looping and counters.
2019-05-30 11:40:56 -05:00
bwatters-r7
a9e1bac5fb
Remove extra stuff that was part of the staged attempt at pingback.
...
It is no longer required because pingback is now a single.
2019-05-30 11:40:54 -05:00
asoto-r7
4092221ca9
Ruby pingback payload (bind and reverse)
2019-05-30 11:40:09 -05:00
asoto-r7
920b034b03
Python pingback payload (reverse only)
2019-05-30 11:40:08 -05:00
asoto-r7
2184ad35b7
python pingback_bind_tcp: send UUID as raw bytes instead of ASCII
2019-05-30 11:40:08 -05:00
asoto-r7
0bcb94f989
Remove 'workspace' option from Mdm::Payload.create
2019-05-30 11:40:08 -05:00
asoto-r7
ce0525cb11
Update metasploit_data_models from 3.0.8 to 3.0.10
2019-05-30 11:40:05 -05:00
asoto-r7
27c41a165a
Python pingback payload (bind only)
2019-05-30 11:38:47 -05:00
asoto-r7
ec01713d7e
Linux pingback payloads
2019-05-30 11:38:47 -05:00
Aaron Soto
c89fd1cc3f
Add error handling for users without a database configured
2019-05-30 11:38:46 -05:00
Aaron Soto
6ac80d0f5a
Enable database support in msfvenom to allow for saving UUIDs
2019-05-30 11:38:46 -05:00
Aaron Soto
e83bdf7c7e
Record UUID upon pingback_reverse_tcp generation and callback
2019-05-30 11:38:46 -05:00
Aaron Soto
a61dd66d95
Record UUID upon reverse_tcp_pingback generation and callback
2019-05-30 11:38:40 -05:00
bwatters-r7
b12128a8d0
Fix odd edge case converting binary to hex string
2019-05-30 11:37:34 -05:00
bwatters-r7
1ab0a04f60
Use nonvolitile register for the counter
...
Change option name to match convention
2019-05-30 11:37:33 -05:00
bwatters-r7
b818d6d9d3
Updated to have a handler
2019-05-30 11:37:33 -05:00
bwatters-r7
a2f55947e6
Add support for pingback as a single and session...
2019-05-30 11:37:33 -05:00
bwatters-r7
e233ee38ea
Let's try it as a single this time....
2019-05-30 11:34:06 -05:00
bwatters-r7
c9c78ba707
Add new files
2019-05-30 11:34:06 -05:00
bwatters-r7
bd65f81627
Add pingback changes
2019-05-30 11:33:46 -05:00
bwatters-r7
535dc343b9
Maybe stage the new files, too
2019-05-30 11:30:55 -05:00
Aaron Soto
e1271317ac
REST API for async-callbacks, removed array datatypes, cleaned up Swagger
2019-05-30 11:30:55 -05:00
Aaron Soto
afddfff3be
WIP: REST API for async-callbacks, added UUID search
2019-05-30 11:30:55 -05:00
Aaron Soto
84acf0d09d
WIP: Remove PUT and DELETE endpoints
2019-05-30 11:30:55 -05:00
Aaron Soto
86c054c5e3
Bring pingback-payload changes into public framework
2019-05-30 11:30:19 -05:00
Aaron Soto
85d35e6c87
WIP: REST API for async-callbacks
2019-05-30 11:25:48 -05:00
Shelby Pace
74812ffe4d
Update modules/exploits/linux/http/librenms_addhost_cmd_inject.rb
...
Co-Authored-By: @shellfail <jrobles@rapid7.com >
2019-05-30 10:52:34 -05:00
Shelby Pace
8c11a1c95a
Update modules/exploits/linux/http/librenms_addhost_cmd_inject.rb
...
Co-Authored-By: @shellfail <jrobles@rapid7.com >
2019-05-30 10:51:57 -05:00
Jacob Robles
4f6d55b773
Update documentation
2019-05-30 06:30:38 -05:00
Shelby Pace
590b9748c1
changed file name and documentation
2019-05-29 18:30:39 -05:00
Shelby Pace
6606e1fed4
Update modules/exploits/linux/http/librenms_cmd_injection.rb
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-05-29 18:00:59 -05:00
Shelby Pace
5253d34dd3
Update modules/exploits/linux/http/librenms_cmd_injection.rb
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-05-29 18:00:07 -05:00
Shelby Pace
34528b1512
Update modules/exploits/linux/http/librenms_cmd_injection.rb
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-05-29 17:59:55 -05:00
Shelby Pace
bd0109b328
add documentation
2019-05-29 15:51:53 -05:00
Shelby Pace
fa1ce20e74
add note
2019-05-29 15:50:31 -05:00
Shelby Pace
de081a08cd
add working exploit
2019-05-29 15:09:23 -05:00
bcoles
ca8c72d586
Fix abrt package version check
2019-05-30 04:24:53 +10:00
Jacob Robles
87e9fddd2f
CMD Target Update
...
Generic payload auto-disables the handler so we don't have
to handle that now. Also, remove datastore modifications
in the module.
2019-05-29 13:09:21 -05:00
Shelby Pace
6279136359
adding and deleting devices
2019-05-28 15:12:35 -05:00
NoodleOfDeath
2a5233156f
Updated wordlists to match generated script provided on https://github.com/rapid7/metasploit-framework/pull/11862
2019-05-28 12:02:03 -04:00
ssyy201506
ecda8d864a
Fix incorrect parsing of IPv6 uri.
2019-05-28 16:41:34 +09:00
NickTyrer
4a359f5f5e
format
2019-05-27 21:19:10 +01:00
NickTyrer
a3b22cbec4
fix formatting
2019-05-27 18:04:24 +01:00
NickTyrer
4487ae7ad3
fix formatting
2019-05-27 18:01:40 +01:00
NickTyrer
73f234a48a
address documentation issues raised by @cbrnrd
2019-05-27 17:55:58 +01:00
NickTyrer
894d817fd1
updated instructions function
2019-05-27 16:58:16 +01:00
NickTyrer
ab20c24340
fix setting mod variables
2019-05-27 16:34:53 +01:00
NickTyrer
b7221a65a1
addressed issues raised by @cbrnrd
2019-05-26 22:18:43 +01:00
Matt Robinson
26eebb9620
Fix multi handler reverse_http to not care so much about the workspace.
2019-05-25 16:25:06 -04:00
NoodleOfDeath
7bd9608d5e
Removed extraneous newline ending in wp-plugins.txt
2019-05-24 17:50:33 -04:00
NoodleOfDeath
d4e79cffe7
added wp-themes wordlist to reflect https://themes.svn.wordpress.org/
2019-05-24 17:40:37 -04:00
NoodleOfDeath
9f3e4e0b65
modified wordlist to reflect https://plugins.svn.wordpress.org/
2019-05-24 17:37:02 -04:00
Shelby Pace
e16d144723
added base of module
2019-05-24 16:20:44 -05:00
NickTyrer
f6eeb7b4b1
fix typo
2019-05-23 20:35:29 +01:00
NickTyrer
9a6d56a8de
fix typo
2019-05-23 20:29:11 +01:00
rwincey
99f3f6cb78
Added x64 arch and fixed exe gen
2019-05-20 23:45:26 -04:00
NoodleOfDeath
5f889919b4
Added a wordlist of 1491 WordPress plugins that can be enumerated in the wp/wp-content/plugins directory
2019-05-20 14:30:02 -04:00
rwincey
7c30422166
Documentation
2019-05-16 00:02:37 -04:00
rwincey
1c05958892
Exploit
2019-05-15 23:36:57 -04:00
Tim W
abbefab5c0
add meterpreter mouse command
2019-05-13 17:06:03 +08:00
Tim W
7ec67fb91f
add meterpreter keyboard_send command
2019-05-11 16:49:01 +08:00
NickTyrer
f023fb9525
add further obfuscation
2019-05-02 08:39:35 +01:00
NickTyrer
38256a18bd
added further obfuscation to module
2019-05-01 17:05:40 +01:00
Brendan Coles
f11ce8635f
Add ptrace Sudo Token Privilege Escalation module
2019-04-30 21:54:18 +00:00
bigendiansmalls
3289d89836
Added Extended passive mode to the core ftp module.
...
Extended passive mode (EPSV), as documented in RFC2428
is similar to the PASSive mode in that it requests that
the server open a port and wait for a data connection.
However, in unlike PASSive mode, Extended Passive mode
returns only the port on which the server listens for
the data connection, not the IP + Port. The client is
expected to use the existing IP (e.g. the one it used to
create the initial control channel connection) to connect
to the new data port.
Where this becomes important is if the server is behind
some type of natting device, EPSV will work in this case,
PASS may not.
2019-04-30 12:41:11 -05:00
NickTyrer
ee7ef7ad4e
fix typo
2019-04-29 22:23:49 +01:00
Mike Menasi
487714b98e
add new evasion module applocker_evasion_install_util
2019-04-29 21:34:56 +01:00
Tim W
d20801cf12
add apple advisory
2019-04-26 13:25:26 +08:00
Tim W
f3f044ec59
add payload length check
2019-04-26 12:28:51 +08:00
Tim W
246fb6fa90
improve description
...
docs
2019-04-22 14:40:57 +08:00
bcoles
421e250086
Update modules/exploits/osx/local/timemachine_cmd_injection.rb
...
Co-Authored-By: timwr <timwr@users.noreply.github.com >
2019-04-21 19:59:14 +08:00
bcoles
f1f64cfbb8
Update modules/exploits/osx/local/timemachine_cmd_injection.rb
...
Co-Authored-By: timwr <timwr@users.noreply.github.com >
2019-04-21 19:59:04 +08:00
Tim W
1a2a85b142
add documentation
2019-04-21 16:04:16 +08:00
Tim W
fbbcc2b607
add exploit binary
2019-04-21 16:02:10 +08:00
Tim W
c2c6c56785
fix cleanup
2019-04-21 16:02:10 +08:00
bcoles
ba03a0c9eb
Remove unused variable
2019-04-20 21:41:25 +10:00
Brendan Coles
a5b894dca3
Add sosreport-rhel7.py
2019-04-20 11:56:01 +00:00
Brendan Coles
e714f9028e
Add ABRT sosreport Privilege Escalation module
2019-04-20 11:48:52 +00:00
bcoles
7a431b0690
Update modules/exploits/osx/local/timemachine_cmd_injection.rb
...
Co-Authored-By: timwr <timwr@users.noreply.github.com >
2019-04-17 22:22:59 +08:00
Tim W
0472f96209
add the exploit binary
2019-04-16 13:09:41 +08:00
Tim W
c428684732
eject only the malformed images
2019-04-16 13:09:13 +08:00
Tim W
a7bd52cb2e
initial commit of CVE-2019-8513 (TimeMachine cmd injection)
2019-04-14 20:58:57 +08:00
h00die
ff5b790028
apache tika exploit msftidy
2019-03-28 22:07:01 -04:00
h00die
dc33998374
apache tika exploit
2019-03-28 22:05:05 -04:00
Quentin Kaiser
e2101c7931
Fix module so it supports both ARCH_CMD and ARCH_ARMLE.
2019-03-28 19:50:26 +01:00
Quentin Kaiser
8ec5a124b4
Follow @bcoles recommendations for 'check' function.
2019-03-28 15:59:22 +01:00
Quentin Kaiser
92e4393025
Update documentation to reflect usage of CmdStager.
2019-03-28 11:09:39 +01:00
Quentin Kaiser
cbcc2f2088
Moved to Cmdstager.
2019-03-28 11:03:01 +01:00
Quentin Kaiser
a9fcd13257
Removed unnecessary includes.
2019-03-28 10:53:07 +01:00
Quentin Kaiser
1a564a6f70
Uppercase words.
2019-03-28 10:49:10 +01:00
Quentin Kaiser
7794cc0234
No need for parenthesis.
2019-03-28 10:48:38 +01:00
Quentin Kaiser
fbaebc14be
Shrink to oneliner.
2019-03-28 10:45:17 +01:00
Quentin Kaiser
cef8dc2fa2
<< is preferred.
2019-03-28 10:42:33 +01:00
Quentin Kaiser
de6f49305c
Correct disclosure date format.
2019-03-27 14:22:37 +01:00
Quentin Kaiser
6fde3ea566
These files have nothing to do here.
2019-03-27 14:20:34 +01:00
Quentin Kaiser
ed7d9a10ac
Release of Awindinc SNMP exploit.
2019-03-27 14:13:36 +01:00
pkb1s
828eee12eb
using "return early, return often" style
2019-03-04 19:31:49 +00:00
pkb1s
8e855867a9
Update exchange_web_server_pushsubscription.rb
2019-03-04 18:39:30 +00:00
pkb1s
d0ab528381
Update exchange_web_server_pushsubscription.rb
2019-03-04 18:15:05 +00:00
pkb1s
794e74c25b
added cve in reference
2019-03-04 17:18:52 +00:00
pkb1s
12ffc2a811
changed reference structure
2019-03-04 17:17:22 +00:00
bcoles
3196b6bacb
Update modules/auxiliary/scanner/http/exchange_web_server_pushsubscription.rb
...
Co-Authored-By: pkb1s <petkoutroubis@gmail.com >
2019-03-04 17:11:00 +00:00
pkb1s
b43f6e8173
updated author section
2019-03-04 17:09:17 +00:00
bcoles
62054ed096
Update modules/auxiliary/scanner/http/exchange_web_server_pushsubscription.rb
...
Co-Authored-By: pkb1s <petkoutroubis@gmail.com >
2019-03-04 17:06:04 +00:00
bcoles
2286824645
Update modules/auxiliary/scanner/http/exchange_web_server_pushsubscription.rb
...
Co-Authored-By: pkb1s <petkoutroubis@gmail.com >
2019-03-04 17:04:49 +00:00
bcoles
40ff19a0c3
Update modules/auxiliary/scanner/http/exchange_web_server_pushsubscription.rb
...
Co-Authored-By: pkb1s <petkoutroubis@gmail.com >
2019-03-04 17:04:34 +00:00
bcoles
7734f436e9
Update modules/auxiliary/scanner/http/exchange_web_server_pushsubscription.rb
...
Co-Authored-By: pkb1s <petkoutroubis@gmail.com >
2019-03-04 17:04:24 +00:00
Pedro Ribeiro
dfb0c8edf2
Merge pull request #7 from rapid7/master
...
bbbb
2019-02-24 22:27:43 +07:00
Garvit Dewan
c48a6ddbdf
Add /boot/grub2/user.cfg path to grub_password
2019-02-21 14:17:15 +05:30
Pedro Ribeiro
26f2b61612
Merge pull request #5 from rapid7/master
...
aaa
2019-02-20 23:38:44 +07:00
pkb1s
e06d7e2ded
correction of CVE number
2019-02-17 21:36:30 +00:00
Garvit Dewan
f823927832
Update documentation
2019-02-17 23:37:52 +05:30
Garvit Dewan
a1b1ace18f
Save the gathered credentials to database
2019-02-17 23:33:12 +05:30
Garvit Dewan
2dd9466c82
Add documentation for grub_password module
2019-02-17 22:15:47 +05:30
Garvit Dewan
85add746e1
Make suggested changes to grub_password module
2019-02-17 21:31:58 +05:30
Garvit Dewan
68414d07ce
Make suggested changes to grub_password module
2019-02-17 20:23:26 +05:30
Garvit Dewan
22340ab2c1
Add *nix Gather Grub Password module
2019-02-17 19:29:47 +05:30
pkb1s
1999f6885b
Minor changes to module options
2019-02-16 13:26:02 +00:00
pkb1s
e12052a83e
Update exchange_web_server_pushsubscription.md
2019-02-16 13:19:07 +00:00
pkb1s
3a77cc9805
Update exchange_web_server_pushsubscription.rb
2019-02-16 02:38:55 +00:00
pkb1s
72f73c59ee
Update exchange_web_server_pushsubscription.md
2019-02-16 02:37:18 +00:00
pkb1s
51df27636d
Add documentation
2019-02-16 02:34:14 +00:00
root
949d140326
Added auxiliary module code
2019-02-16 02:04:40 +00:00
Pedro Ribeiro
291320ea8c
Merge pull request #4 from rapid7/master
...
merge
2019-01-30 22:05:11 +07:00
Brendan Coles
0a5957c36f
Add Linux support to multi/script/web_delivery
2019-01-06 19:40:30 +00:00
Aaron Ringo
9dd4017674
some modifications to WIP, changed gcc, fixed other errors
2018-11-26 21:06:37 -06:00
Aaron Ringo
5e9c10dbe8
added modulepath, tested on centos with selinux
2018-11-25 19:48:05 -06:00
Aaron Ringo
2ad453b6e3
added modulepath
2018-11-25 15:54:37 -06:00
Quentin Kaiser
479b09962c
Awind stuff.
2018-09-11 15:16:23 +02:00
Tim W
17ffd83374
only upload screenshot dll on windows
2018-09-04 00:36:30 +08:00